{"id":7833,"date":"2025-10-19T05:36:19","date_gmt":"2025-10-19T05:36:19","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7833"},"modified":"2025-10-19T05:36:19","modified_gmt":"2025-10-19T05:36:19","slug":"nation-state-hackers-ship-malware-from-bulletproof-blockchains","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7833","title":{"rendered":"Nation-state hackers ship malware from \u201cbulletproof\u201d blockchains"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2025\/05\/malware-threat-1000x648.jpg\" \/><\/p>\n<p>Hacking teams\u2014at the very least one in every of which works on behalf of the North Korean authorities\u2014have discovered a brand new and cheap method to distribute malware from \u201cbulletproof\u201d hosts: stashing them on public cryptocurrency blockchains.<\/p>\n<p>In a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/dprk-adopts-etherhiding\/\">Thursday put up<\/a>, members of the Google Risk Intelligence Group mentioned the approach offers the hackers with their very own \u201cbulletproof\u201d host, a time period that describes cloud platforms which can be largely immune from takedowns by legislation enforcement and strain from safety researchers. Extra historically, these hosts are positioned in nations with out treaties agreeing to implement legal legal guidelines from the US and different nations. These companies typically cost hefty sums and cater to criminals spreading malware or peddling baby sexual abuse materials and wares offered in crime-based flea markets.<\/p>\n<h2>Subsequent-gen, DIY internet hosting that may\u2019t be tampered with<\/h2>\n<p>Since February, Google researchers have noticed two teams turning to a more recent approach to contaminate targets with credential stealers and different types of malware. The strategy, often known as EtherHiding, embeds the malware in sensible contracts, that are primarily apps that reside on blockchains for Ethereum and different cryptocurrencies. Two or extra events then enter into an settlement spelled out within the contract. When sure circumstances are met, the apps implement the contract phrases in a means that, at the very least theoretically, is immutable and unbiased of any central authority.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/10\/hackers-bullet-proof-hosts-deliver-malware-from-blockchains\/\">Learn full article<\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/10\/hackers-bullet-proof-hosts-deliver-malware-from-blockchains\/#comments\">Feedback<\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Hacking teams\u2014at the very least one in every of which works on behalf of the North Korean authorities\u2014have discovered a brand new and cheap method to distribute malware from \u201cbulletproof\u201d hosts: stashing them on public cryptocurrency blockchains. In a Thursday put up, members of the Google Risk Intelligence Group mentioned the approach offers the hackers [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7835,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[5968,5306,128,554,216,5967],"class_list":["post-7833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news","tag-blockchains","tag-bulletproof","tag-deliver","tag-hackers","tag-malware","tag-nationstate"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7833"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7833\/revisions"}],"predecessor-version":[{"id":7834,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7833\/revisions\/7834"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/7835"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 18:01:38 UTC -->