{"id":350760,"date":"2025-10-23T02:05:00","date_gmt":"2025-10-23T09:05:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=399783"},"modified":"2025-10-23T03:39:40","modified_gmt":"2025-10-23T10:39:40","slug":"north-korean-hackers-discover-a-way-to-steal-cryptocurrencies-through-the-blockchain","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/north-korean-hackers-discover-a-way-to-steal-cryptocurrencies-through-the-blockchain\/","title":{"rendered":"North Korean hackers discover a way to steal cryptocurrencies through the blockchain"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">North Korean hackers have developed new cyberattack techniques that compromise computer security, according to a recent report from Google. These tactics, <strong>which employ sophisticated methods, represent a concerning evolution in the way threat actors carry out their operations in cyberspace<\/strong>.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Your money is not safe on the blockchain either<\/h2>\n\n\n<p class=\"wp-block-paragraph\">One of the most concerning strategies identified is the use of EtherHiding, a technique based on blockchain. <strong>This method allows for the concealment of malware delivery through the use of transactions on Ethereum, making it difficult for security systems to detect<\/strong>. By hiding the malware within legitimate blockchain traffic, attackers can bypass conventional protective measures and increase their chances of success.<\/p>\n\n\n<p class=\"wp-block-paragraph\">The main objective of these attacks is the theft of cryptocurrencies from users. Using this technique, hackers take advantage of the growing popularity of cryptocurrencies and the lack of experience of some users in digital security. <strong>The malware, once delivered, can steal confidential information, such as private keys and access data to digital wallets, thus facilitating access to the victims&#8217; funds<\/strong>.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"This Commercial Isn\u2019t About Pizza | Crypto Moves Money Forward\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/NON0euNOj3k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p class=\"wp-block-paragraph\">This finding highlights the urgent need for cryptocurrency users to adopt stricter security measures, such as two-factor authentication and regular reviews of their financial activities. Meanwhile, <strong>cryptocurrency exchange platforms are advised to be vigilant against such threats and to improve their security protocols to protect their users<\/strong>.<\/p>\n\n\n<p class=\"wp-block-paragraph\">While it has been confirmed that North Korean hackers are using these advanced techniques, <strong>they can be expected to continue adapting and evolving in response to cyber defenses<\/strong>. The cybersecurity community will need to remain vigilant to counter this new wave of attacks.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"ChatGPT\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/b330d2b7-464c-4693-b81d-2c97b1edf062\/857405465\/chatgpt-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">ChatGPT<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/chatgpt.softonic.com\/iphone\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/chatgpt.softonic.com\/iphone\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>North Korean hackers have developed new cyberattack techniques that compromise cybersecurity, according to a recent report from Google. These tactics, which employ sophisticated methods, represent a concerning evolution in the way threat actors carry out their operations in cyberspace. Your money is also not safe in the blockchain One of the most alarming strategies identified is the use of EtherHiding, a blockchain-based technique. This method allows for the concealment of malware delivery through the use of transactions on Ethereum, making detection by security systems more difficult.<\/p>\n","protected":false},"author":9318,"featured_media":350761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015,11143],"tags":[5605,5816,15835,17542,1627,17543,17544],"usertag":[],"vertical":[],"content-category":[7176],"class_list":["post-350760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-softwaresecurity","tag-ciberseguridad","tag-criptomonedas","tag-ethereum","tag-hackers-norcoreanos","tag-malware","tag-seguridad-informatica","tag-sistema-de-seguridad","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/350760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=350760"}],"version-history":[{"count":3,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/350760\/revisions"}],"predecessor-version":[{"id":350786,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/350760\/revisions\/350786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/350761"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=350760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=350760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=350760"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=350760"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=350760"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=350760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}