Search
U.S. Sanctions North Korean Bankers Over Crypto Laundering Tied to Cyberattacks
4.11.2025
The Treasury Department sanctioned eight individuals and two entities accused of using crypto and shell companies to funnel millions into Pyongyang’s weapons programs
North Korea’s AI-Powered Hackers Are Redefining Crypto Crime
25.10.2025
Mysten Labs’ chief cryptographer warns that artificial intelligence, not quantum computing, poses the real near-term threat to blockchain security
Google: North Korea Uses Blockchain to Distribute Malware
20.10.2025
A report from the Google Threat Intelligence Group warned about a malware campaign implemented by North Korea that uses EtherHiding. The campaign uses a smart contract on a public chain, such as Ethereum or BNB, to avoid deletion or removal by traditional methods. Google Warns About North Korea...
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract