Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Google reveals North Korea-linked hackers use "Ethereum hiding" techniques for cryptocurrency theft and sensitive information collection

Google reveals North Korea-linked hackers use "Ethereum hiding" techniques for cryptocurrency theft and sensitive information collection

金色财经金色财经2025/10/17 05:57
Show original

Jinse Finance reported that Google Threat Intelligence Group (GTIG) released investigation results on the 17th, stating that the North Korea-linked hacker group UNC5324 is using a new technique called "Ether Hiding" to steal cryptocurrencies and collect sensitive information. The group emphasized that this investigation is the first time the "Ether Hiding" technique, which uses public decentralized blockchains to hide malware, has been found to be abused by state-sponsored threat actors, which is of significant importance. GTIG detected that UNC5324 lured developers into installing malware through a social engineering attack campaign called "Contagious Interview" by Palo Alto Networks. This attack affected multiple operating systems including Windows, macOS, and Linux through a multi-stage malware infection process. The attackers stored the malware on immutable blockchains and invoked it in a "read-only" manner, thereby continuously issuing control commands and manipulating victim systems anonymously.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!