XRP and Other Cryptocurrencies Under Attack from EtherHiding Malware

A new cyber threat called EtherHiding is making headlines as North Korean hackers exploit blockchain technology to spread malware that steals XRP and other digital assets. This attack shows how cybercriminals are using advanced blockchain tools to hide their malicious operations.

A New Cyber Threat Called EtherHiding

How the EtherHiding Technique Works

In this attack, hackers hide harmful code inside blockchain smart contracts. Because these contracts exist on decentralized blockchains, the malware cannot easily be removed or taken down. The attackers can also modify or update the malicious files whenever they want, maintaining long-term access to infected systems and keeping their operations active.

Fake Job Offers Spreading the Malware

The hackers are conducting a deceptive campaign known as “Contagious Interview.” They pose as recruiters and reach out to developers in the crypto and tech industries. Victims are asked to take part in coding challenges or install fake testing software, which secretly installs malware. Once infected, the system allows the attackers to steal XRP, crypto wallets, login details, and other sensitive data from the victim’s computer.

A New Generation of Blockchain-Based Cyberattacks

Experts describe EtherHiding as a turning point in blockchain security risks. Unlike traditional attacks that rely on central servers, this method uses blockchain networks themselves—making it nearly impossible to detect or disable. When users interact with compromised websites, the hidden code silently activates and begins stealing XRP, other cryptocurrencies, and private information without leaving clear traces.

Advanced Multi-Stage Malware Across All Platforms

The EtherHiding campaign uses several layers of malware, including variants named JADESNOW, BEAVERTAIL, and INVISIBLEFERRET. These target multiple operating systems like Windows, macOS, and Linux. Each stage of the malware strengthens the hackers’ control, ensuring continued access to victims’ devices and corporate networks. This has already resulted in significant cryptocurrency thefts across the globe.

In summary:

EtherHiding marks a dangerous evolution in cyberattacks. By combining blockchain technology with social engineering tactics, hackers are effectively stealing XRP and other crypto assets while staying hidden from traditional cybersecurity defenses.

Visited 13 times, 1 visit(s) today