PROBABLYPWNED
Threat IntelligenceApril 15, 20264 min read

North Korea's UNC5342 Hides Malware in Blockchain Smart Contracts

Google researchers expose EtherHiding technique storing malware payloads in Ethereum and BNB smart contracts. First nation-state adoption of unkillable blockchain C2 infrastructure.

Alex Kowalski

North Korean threat actors have found a way to make their malware infrastructure essentially untouchable. Google Threat Intelligence Group researchers revealed that a DPRK-linked group tracked as UNC5342 is embedding malicious payloads inside smart contracts on Ethereum and BNB Smart Chain—infrastructure that defenders can't seize, sink, or take down.

The technique, known as EtherHiding, represents the first documented case of a nation-state adopting blockchain-based command and control at scale. Because blockchains are immutable and decentralized, the malicious code persists indefinitely once deployed.

How EtherHiding Works

Traditional malware connects to command servers that defenders can identify and take offline. EtherHiding flips that model.

Instead of hardcoding a C2 server address, the malware queries a smart contract on a public blockchain to retrieve its instructions. The attack chain operates like this:

  1. Victim downloads infected files from GitHub or npm repositories
  2. The JadeSnow loader executes and connects to blockchain explorer APIs
  3. JadeSnow queries Ethereum or BNB Smart Chain smart contracts
  4. The contracts return Base64-encoded, XOR-encrypted payloads
  5. InvisibleFerret backdoor deploys for persistent access and credential theft

The elegance—from an attacker's perspective—is that these read-only blockchain calls leave almost no forensic trace compared to traditional network traffic. Security teams monitoring for malicious domains or IP addresses won't catch it.

Bulletproof by Design

Researchers describe EtherHiding as "next-generation bulletproof hosting." The infrastructure advantages are significant:

  • Immutability: Smart contracts can't be modified or removed once deployed
  • Decentralization: No single server to seize or domain to sinkhole
  • Low cost updates: A single blockchain transaction costing $0.25 to $1.50 can update the entire attack chain
  • Anonymity: Wallet addresses obscure attacker identity

This marks an evolution from the Omnistealer campaign we covered earlier today, which uses similar blockchain C2 techniques across TRON, Aptos, and Binance Smart Chain networks. The convergence suggests DPRK operators are standardizing on blockchain infrastructure across multiple malware families.

The Contagious Interview Connection

UNC5342 operates what Palo Alto Networks tracks as the "Contagious Interview" campaign. The group uses social engineering techniques to impersonate recruiters on LinkedIn and job boards, approaching developers with opportunities at fake companies like "BlockNovas LLC" and "Angeloper Agency."

During staged technical assessments conducted over Telegram and Discord, victims are directed to download files from GitHub or npm repositories containing the JadeSnow loader. The social engineering is polished enough that Security Alliance blocked 164 UNC5342-linked domains impersonating services like Microsoft Teams and Zoom between February and April 2026.

This campaign has scaled dramatically, with researchers tracking over 1,700 malicious packages published across npm, PyPI, Go, Rust, and PHP ecosystems. The supply chain component ensures the malware reaches developers who never interacted with fake recruiters directly.

What InvisibleFerret Steals

The final payload is designed for cryptocurrency theft and intelligence collection:

  • Cryptocurrency wallets: MetaMask, Phantom, and other browser extensions
  • Browser credentials: Saved logins and session cookies
  • Clipboard monitoring: Captures copied wallet addresses and passwords
  • Keylogging: Records typed credentials

The targeting aligns with established Lazarus Group patterns—revenue generation for sanctions evasion alongside intelligence gathering. By early 2026, DPRK-attributed cryptocurrency theft across approximately 270 documented incidents totals an estimated $6.71 billion.

Defensive Choke Points

Despite the blockchain's decentralization, UNC5342 still depends on centralized services to interact with it. Google researchers note that defenders should focus on these "points of observation and control":

  • Blockchain explorer APIs: Services like Etherscan that malware uses to query contracts
  • RPC endpoints: The interfaces applications use to read blockchain data
  • Hosting platforms: Services like Cloudflare that attackers leverage for obfuscation

Practical defenses include:

  • Monitor endpoints for unexpected Web3.js library usage or blockchain API calls
  • Validate recruitment communications independently—verify company names and recruiter identities
  • Implement npm/PyPI package verification and sandboxing
  • Enforce Chrome Enterprise management to block malicious downloads
  • Coordinate with API providers to block suspicious contract queries

Why This Matters

Traditional security models assume infrastructure can be taken down. EtherHiding challenges that assumption fundamentally. Once a smart contract is deployed, it remains accessible for the lifetime of the blockchain network.

The combination of social engineering, supply chain compromise, and unkillable infrastructure creates a persistent threat that won't disappear through conventional incident response. Organizations in the cryptocurrency, technology, and finance sectors should expect this technique to proliferate—Google researchers confirmed UNC5342 isn't alone, with financially-motivated group UNC5142 running parallel campaigns across 14,000 compromised WordPress sites.

The broader pattern of North Korean cyber operations—from the Ledger wallet theft to supply chain attacks—demonstrates DPRK's increasing sophistication in targeting cryptocurrency infrastructure. As these techniques evolve, defenders will need to rethink assumptions about what infrastructure can actually be taken down.

Related Articles