Home
/
Blockchain technology
/
Technology innovations
/

Hackers exploit blockchains as malware havens, google warns

Hackers Exploit Blockchains as Malware Havens | Google Raises Alarm

By

Sofia Petrov

Oct 20, 2025, 07:08 PM

Edited By

Liam Murphy

Updated

Oct 21, 2025, 12:00 PM

2 minutes reading time

Hackers exploiting public blockchains to hide malware, showing digital locks and chains.
popular

In a troubling update, Google's Threat Intelligence Group has revealed that hackers, including state-sponsored factions from North Korea, are hiding malware in public blockchains like Ethereum and BNB Smart Chain. This alarming tactic raises substantial risks for users.

Understanding EtherHiding

The technique called EtherHiding enables hackers to keep malware within blockchain smart contracts. This storage method makes the code virtually undetectable, emphasizing the challenges of blockchain's decentralized and permanent traits. Users on various forums clarified that while the malware source may be visible, the way data is mishandled can lead to harmful consequences.

What Users Are Discussing

Users have highlighted important aspects:

  1. Execution Requirement: One participant noted, "Whether or not you use the blockchain will not determine if you get infected. The real issue is clicking on a suspicious link." This underscores that without initial execution, the malware remains dormant.

  2. Malware in Media: Thereโ€™s a suggestion that some malware could be hidden in seemingly innocent videosโ€”a format that can activate when played on unprotected players.

  3. Decentralized Nature Makes it Tough: Commenters pointed out that the decentralized structure complicates efforts to block malware or disrupt its storage by taking down a single node.

Malware Perspectives

Interestingly, several users emphasized that malware isn't just about dormant code. One commented, "Most malware starts with a dropper, making it easier for hackers to distribute their payload." This reflects a widespread sentiment among forum participants, expressing real concerns about infection methods.

"It feels like this makes malware distribution more straightforward than other tech," one individual stated, encapsulating fears around the potential risks tied to blockchain.

Growing Concerns

Forum discussions revealed a mixed sentiment, with skepticism about the feasible threat while acknowledging the implications of such storage. Topics of concern include:

  • Transparency vs. Security: Some argue that the visible nature of the stored code could help antivirus programs better detect threats.

  • Weakness in Current Solutions: Participants have pointed out that existing cybersecurity measures are insufficient against these emerging threats, urging for more robust protective strategies.

  • Infection Methodologies: Many believe addressing the initial points of contactโ€”like suspicious emailsโ€”is crucial for preventing infections.

Key Insights

  • ๐Ÿ”’ Emerging Tactics: Hackers are using blockchain contracts for malware, complicating detection efforts.

  • ๐ŸŒ State Involvement: North Korean groups are leveraging these strategies to hide malware from scrutiny.

  • ๐Ÿ”— Transparency vs. Threat: Opinions are divided on whether blockchain visibility aids or hinders antivirus defenses.

  • โš ๏ธ Call for Action: Users stress the necessity for elevated security standards to combat evolving cyber threats.

The Road Ahead

As criminals continue refining their tactics, thereโ€™s a pressing need for specialized detection technologies. Experts posit that in the upcoming year, around 60% of cybersecurity professionals will agree on adapting antivirus programs to identify blockchain-stored malware. This evolution may require partnerships between traditional cybersecurity firms and blockchain specialists to enhance threat responses effectively. As challenges grow, so does the likelihood of regulators stepping in, especially as state-sponsored operations increase within these digital domains.

A Historical Parallel

The situation harkens back to early email struggles with SMTP. Just as email systems evolved amid spam and phishing, the challenges now faced by blockchain technology could drive innovation and a reevaluation of security practices. The industry's response will determine how effectively these threats are managed moving forward.