Categories: Cyber Security News

Cybercriminals Use EtherHiding to Spread Malware and Constantly Shift Payloads Online

Attackers are taking malware delivery to a new level using a technique known as EtherHiding, which stores malicious payloads directly inside blockchain smart contracts.

This method, first observed by researchers at Censys, allows cybercriminals to update and rotate malware with minimal effort while keeping compromised websites unchanged.

By leveraging the Binance Smart Chain testnet and JavaScript injections, the campaign shifts the hosting model from centralized servers to decentralized blockchain storage, creating a durable, low‑cost delivery network.

How the EtherHiding Attack Works

The attack starts with a web injection on a compromised website. Criminals add a script tag containing a Base64‑encoded JavaScript blob disguised behind a fake CAPTCHA image, often using the recognizable reCAPTCHA logo from Wikimedia.

When victims try to “verify they are human,” the injected JavaScript loads the Ethers library and communicates with smart contracts on the Binance Smart Chain. Through eth_call requests, the script retrieves OS‑specific payloads without using static URLs.

The first smart contract validates whether the browser is automated or headless. If it passes, a second call fetches the payload based on the victim’s operating system, Windows or macOS.

Attackers even use a “contract gate” mechanism that accepts or denies victims based on unique identifiers stored in browser cookies. All updates occur on‑chain, allowing attackers to modify payloads by simply altering blockchain data rather than web servers.

Once verified, the script displays a fake CAPTCHA prompt asking users to copy and run text locally, a social‑engineering trick called the Click‑Fix technique. On Windows, the copied command triggers MSHTA for remote execution.

On macOS, it uses Terminal commands to download additional scripts with curl and establish persistence via LaunchAgent files. This deception bypasses many antivirus or browser defenses because users execute the commands themselves.

macOS and Blockchain‑Based Control

The macOS payload goes further, performing credential theft and command‑and‑control (C2) communication. It collects system details, verifies stored passwords using native tools, and even scrapes data from Telegram or Steam profiles to find updated C2 addresses.

The script stays in constant contact with the attacker’s server, synchronizing stolen credentials and fetching new commands periodically.

The macos specific click-fix lure.

EtherHiding highlights how blockchain infrastructure is being repurposed for malicious use. By using smart‑contract storage for dynamic payloads, attackers hide behind decentralized systems that are difficult to take down.

Defenders can still detect such threats by monitoring websites for base64‑encoded scripts, unexpected Ethers library imports, or fake CAPTCHA assets that instruct users to copy code.

This campaign shows that decentralized technology, once meant for transparency and security, is now a powerful tool for adaptive malware distribution.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Cybercriminals Use EtherHiding to Spread Malware and Constantly Shift Payloads Online appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Refurbished Sonos Arc Ultra Soundbar Finally Shows in Stock With a Sweet 20% Discount

For the first time this year, Sonos' flagship Arc Ultra soundbar is showing up in…

17 minutes ago

Save 40% Off the Lenovo Legion Glasses 2 Micro-OLED Personal Wearable Display on Amazon

The Lenovo Legion Glasses 2 was released back in February 20225 at a starting price…

17 minutes ago

Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits

Philadelphia, United States / Pennsylvania, April 14th, 2026, CyberNewswire GIAC and ISC2 now recognize active participation in SRA Purple…

1 hour ago

Fortinet Patches 11 Vulnerabilities Across FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager

Fortinet released a sweeping batch of security advisories on April 14, 2026, addressing 11 vulnerabilities…

1 hour ago

Microsoft Patch Tuesday April 2026 – 168 Vulnerabilities Fixed, Including Actively Exploited 0-day

Microsoft has released its April 2026 Patch Tuesday security update, addressing 168 vulnerabilities across its…

1 hour ago

Trey Williams Gets Prison Time

INDIANAPOLIS, Ind. (WOWO) — An 18-year-old from Fishers was sentenced to prison on Tuesday for…

1 hour ago

This website uses cookies.