Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
North Korean Hackers Deploy Blockchain-Based Tools in Expanding Global Cyber Campaign

North Korean Hackers Deploy Blockchain-Based Tools in Expanding Global Cyber Campaign

BeInCryptoBeInCrypto2025/10/16 21:06
By:Shigeki Mori

North Korea-linked threat actors are escalating their cyber operations using decentralized and evasive malware tools, according to new findings from Cisco Talos and Google Threat Intelligence Group. The campaigns aim to steal cryptocurrency, infiltrate networks, and evade detection through sophisticated job recruitment scams. Evolving Malware Techniques Reflect Expanding Capabilities Cisco Talos researchers identified an ongoing

North Korea-linked threat actors are escalating their cyber operations using decentralized and evasive malware tools, according to new findings from Cisco Talos and Google Threat Intelligence Group.

The campaigns aim to steal cryptocurrency, infiltrate networks, and evade detection through sophisticated job recruitment scams.

Evolving Malware Techniques Reflect Expanding Capabilities

Cisco Talos researchers identified an ongoing campaign by the North Korean group Famous Chollima. The group has used two complementary malware strains, BeaverTail and OtterCookie. These programs, traditionally used for credential theft and data exfiltration, have now evolved to integrate new functionalities and closer interoperation.

In a recent incident involving an organization in Sri Lanka, attackers lured a job seeker into installing malicious code disguised as part of a technical evaluation. Even though the organization itself was not a direct target, Cisco Talos analysts also observed a keylogging and screenshotting module linked to OtterCookie, which highlights the broader risk to individuals involved in fake job offers. This module covertly recorded keystrokes and captured desktop images, automatically transmitting them to a remote command server.

Cisco Talos reports that the North Korean group Famous Chollima is using a new JavaScript module combining BeaverTail and OtterCookie for keylogging and screenshots, targeting job seekers through fake offers and malicious Node.js packages. #CyberSecurity

— Cyber_OSINT (@Cyber_O51NT)

This observation underscores the ongoing evolution of North Korea-aligned threat groups and their focus on social engineering techniques to compromise unsuspecting targets.

Blockchain Used as a Command Infrastructure

Google’s Threat Intelligence Group (GTIG) identified an operation by a North Korea-linked actor, UNC5342. The group used a new malware called EtherHiding. This tool hides malicious JavaScript payloads on a public blockchain, turning it into a decentralized command and control (C2) network.

By using blockchain, attackers can change malware behavior remotely without traditional servers. Law enforcement takedowns become much harder. Furthermore, GTIG reported that UNC5342 applied EtherHiding in a social engineering campaign called Contagious Interview, which had been previously identified by Palo Alto Networks, demonstrating the persistence of North Korea-aligned threat actors.

What is EtherHiding?It's a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).

— blackorbird (@blackorbird)

Targeting Job Seekers to Steal Cryptocurrency and Data

According to Google researchers, these cyber operations typically begin with fraudulent job postings aimed at professionals in the cryptocurrency and cybersecurity industries. Victims are invited to participate in fake assessments, during which they are instructed to download files embedded with malicious code.

The infection process often involves multiple malware families, including JadeSnow, BeaverTail, and InvisibleFerret. Together, they let attackers access systems, steal credentials, and deploy ransomware efficiently. The end goals range from espionage and financial theft to long-term network infiltration.

Cisco and Google have published indicators of compromise (IOCs) to help organizations detect and respond to ongoing North Korea-linked cyber threats. These resources provide technical details for identifying malicious activity and mitigating potential breaches. Researchers warn that the integration of blockchain and modular malware will likely continue to complicate global cybersecurity defense efforts.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

The PENGU Price Decline: Market Turbulence or a Chance to Invest?

- PENGU's 28.5% price drop from $0.045 to $0.023 reflects macroeconomic turbulence, 2025 Fed tightening, and a $19B small-cap token liquidity crunch. - The Pudgy Penguins ecosystem expands into gaming, retail partnerships, and physical products, but faces unproven utility and regulatory uncertainty. - Technical indicators show bullish OBV/MACD and whale accumulation, yet bearish signals include $66.6M team wallet outflows and USDT dependency risks. - DCF analysis estimates intrinsic value at $0.02782-$0.06

Bitget-RWA2025/11/29 05:40
The PENGU Price Decline: Market Turbulence or a Chance to Invest?

Unpacking the Growing Curiosity Around PENGU Price Forecasts

- PENGU price prediction interest surges amid speculative fervor and evolving retail investor psychology in crypto markets. - Token's 78.89% YTD decline highlights structural risks, technical headwinds, and regulatory uncertainties despite short-term rebounds. - FOMO-driven trading and emotional cycles amplify volatility, with PENGU's 480% July 2025 surge followed by 28.5% drop illustrating market dynamics. - High-volatility assets like PENGU challenge diversification strategies, showing 55% annualized vol

Bitget-RWA2025/11/29 05:40
Unpacking the Growing Curiosity Around PENGU Price Forecasts

Bitcoin News Update: The Cryptocurrency Market’s Tentative Rebound Depends on Institutional Trust and Federal Reserve Guidance

- Crypto market shifts from extreme fear to cautious optimism as Bitcoin stabilizes between $85,000–$89,000 amid Fed policy speculation. - ETF inflows ($129M in Bitcoin, $78.58M in Ethereum) and institutional buys ($93M by ARK Invest) signal tentative recovery despite 30% decline from October peaks. - Weak altcoin performance (Altcoin Season Index at 25) contrasts with Bitcoin dominance, while technical analysis warns of $90,000 resistance and $80,000–$86,500 support tests. - Market stability hinges on Fed

Bitget-RWA2025/11/29 05:40
Bitcoin News Update: The Cryptocurrency Market’s Tentative Rebound Depends on Institutional Trust and Federal Reserve Guidance

AAVE gains 4.1% over the past week as Avail Nexus debuts and cross-chain advancements emerge

- AAVE rose 4.1% in 7 days amid Avail Nexus Mainnet launch, enhancing cross-chain liquidity for DeFi. - Avail's Nexus connects Ethereum , Solana , and EVM chains, enabling unified asset flows across fragmented blockchains. - Aave benefits from modular infrastructure trends, supporting multi-chain operations without compromising security or efficiency. - Despite 1-year 39.84% decline, analysts highlight Aave's strategic position in evolving cross-chain DeFi ecosystems.

Bitget-RWA2025/11/29 05:32