North Korean hackers have developed new cyberattack techniques that compromise computer security, according to a recent report from Google. These tactics, which employ sophisticated methods, represent a concerning evolution in the way threat actors carry out their operations in cyberspace.
Your money is not safe on the blockchain either
One of the most concerning strategies identified is the use of EtherHiding, a technique based on blockchain. This method allows for the concealment of malware delivery through the use of transactions on Ethereum, making it difficult for security systems to detect. By hiding the malware within legitimate blockchain traffic, attackers can bypass conventional protective measures and increase their chances of success.
The main objective of these attacks is the theft of cryptocurrencies from users. Using this technique, hackers take advantage of the growing popularity of cryptocurrencies and the lack of experience of some users in digital security. The malware, once delivered, can steal confidential information, such as private keys and access data to digital wallets, thus facilitating access to the victims’ funds.
This finding highlights the urgent need for cryptocurrency users to adopt stricter security measures, such as two-factor authentication and regular reviews of their financial activities. Meanwhile, cryptocurrency exchange platforms are advised to be vigilant against such threats and to improve their security protocols to protect their users.
While it has been confirmed that North Korean hackers are using these advanced techniques, they can be expected to continue adapting and evolving in response to cyber defenses. The cybersecurity community will need to remain vigilant to counter this new wave of attacks.