Categories: Cyber Security News

SharkStealer Implements EtherHiding to Manage and Hide C2 Channel Traffic

A new Golang-based infostealer named SharkStealer has emerged as one of the latest examples of threat actors leveraging blockchain technology for stealth and persistence.

Security researchers discovered that the malware uses the BNB Smart Chain (BSC) Testnet to conceal its command‑and‑control (C2) infrastructure through a tactic known as EtherHiding, allowing it to blend malicious communications with legitimate blockchain activity.

Sponsored
class="wp-block-heading" id="h-etherhiding-technique-enables-decentralized-c2-resolution">EtherHiding Technique Enables Decentralized C2 Resolution

EtherHiding is a growing malware tactic in which attackers store key data or code fragments within smart contracts on public blockchains. SharkStealer adopts this method by issuing Ethereum RPC calls specifically eth_call requests to the BSC Testnet.

The blockchain responses return a tuple containing an initialization vector (IV) and an encrypted payload. The payload conceals the malware’s C2 address, which the binary then decrypts locally using a hardcoded AES key in Cipher Feedback (CFB) mode along with the returned IV.

This approach effectively turns the blockchain into a dead-drop for encrypted C2 data, ensuring threat actors maintain a resilient and tamper-resistant communication method.

Because blockchain transactions cannot easily be altered or blocked without disrupting legitimate use cases, traditional network defense measures such as domain reputation scoring or sinkholing become far less effective.

Threat actors gain the further advantage of being able to update or rotate C2 servers by redeploying smart contracts rather than relying on hijacked domains or exposed infrastructure.

Technical Analysis and Observed Indicators

Analysis from VMRay and threat researchers shows that SharkStealer connects to the BSC Testnet RPC node at data-seed-prebsc-2-s1.binance[.]org:8545.

The malware queries at least two smart contracts, identified as 0xc2c25784E78AeE4C2Cb16d40358632Ed27eeaF8E and 0x3dd7a9c28cfedf1c462581eb7150212bcf3f9edf, both using function selector 0x24c12bf6.

A sample associated with the campaign has the SHA‑256 hash 3d54cbbab911d09ecaec19acb292e476b0073d14e227d79919740511109d9274. Once the payload is decrypted, the malware retrieves its active C2 servers, which in this case include 84.54.44[.]48 and securemetricsapi[.]live.

This mechanism significantly complicates static and dynamic analysis, since the C2 is not hardcoded in plaintext and must be resolved at runtime using blockchain data.

Sponsored
Sharkstealer implements etherhiding to manage and hide c2 channel traffic 2

The method demonstrates how threat actors can adopt decentralized infrastructure to minimize traceability and ensure continuity even if part of the network is disrupted.

Persistent Evolution of Blockchain-backed Malware

The adoption of blockchain-based communication channels marks an essential evolutionary step in malware design.

As defenders increase visibility over traditional web-based infrastructure, adversaries have turned toward decentralized environments that offer resilience, anonymity, and censorship resistance.

EtherHiding exemplifies this shift, offering a reliable means for cybercriminals to distribute or update components long after initial detection, secretly.

Security teams are advised to improve their ability to monitor blockchain-related traffic, especially Ethereum RPC activity on corporate endpoints, to detect anomalous behaviors indicative of malicious contract interaction.

The rise of SharkStealer reinforces how blending Web3 mechanisms with conventional malware threatens to blur the line between legitimate decentralized technologies and covert cyber operations.

IoCs

  • BSC Testnet RPC: data-seed-prebsc-2-s1.binance[.]org:8545
  • Smart contracts + function:
    • 0xc2c25784E78AeE4C2Cb16d40358632Ed27eeaF8E, Function: 0x24c12bf6
    • 0x3dd7a9c28cfedf1c462581eb7150212bcf3f9edf, Function: 0x24c12bf6
  • Sample SHA-256: 3d54cbbab911d09ecaec19acb292e476b0073d14e227d79919740511109d9274
  • Observed C2s: 84.54.44[.]48 , securemetricsapi[.]live

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post SharkStealer Implements EtherHiding to Manage and Hide C2 Channel Traffic appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

10x celebrates 100th release

10x has unveiled release 10.0, which is the 100th release of the 10x Banking Platform.…

34 minutes ago

Sirion appoints Pat McBrearty as EVP and Global Head of Alliances

Sirion has appointed Pat McBrearty as  Executive Vice President and Global Head of Alliances. The…

34 minutes ago

Gong fires up Customer Office with Simon Frey as CCO

Gong has announced the promotion of Simon Frey to the role of Chief Customer Officer.…

34 minutes ago

Logicalis reports high AI adoption among UK CIOs, but concerns remain about rapid pace.

Logicalis, a global technology service provider, has released its annual CIO Report, Harnessing AI: IT…

34 minutes ago

Ted Season 2 Exclusive: Go Behind the Scenes of the Special Dungeons & Dragons Episode

Warning: This article includes spoilers and details about Ted Season 2.Ted is back on Peacock,…

50 minutes ago

The Trump phone was a no-show at the world’s biggest mobile show

Where's the Trump phone? We're going to keep talking about it every week. We've reached…

1 hour ago

This website uses cookies.