North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
North Korean hackers have utilized the EtherHiding technique to distribute malware and facilitate cryptocurrency theft, marking a significant development in state-sponsored cyber activities. This method, attributed to the threat cluster UNC5342 by Google Threat Intelligence Group, represents a novel approach in the hacking landscape.
Google
Read Full Original Article →