• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
binance's smart chain exploited in new 'etherhiding' malware campaign

Binance’s Smart Chain Exploited in New ‘EtherHiding’ Malware Campaign

You are here: Home / General Cyber Security News / Binance’s Smart Chain Exploited in New ‘EtherHiding’ Malware Campaign
October 16, 2023

Risk actors have been observed serving malicious code by using Binance’s Smart Chain (BSC) contracts in what has been described as the “future stage of bulletproof hosting.”

The campaign, detected two months in the past, has been codenamed EtherHiding by Guardio Labs.

The novel twist marks the hottest iteration in an ongoing marketing campaign that leverages compromised WordPress web pages to provide unsuspecting site visitors a fake warning to update their browsers in advance of the internet sites can be accessed, finally main to the deployment of facts stealer malware such as Amadey, Lumma, or RedLine.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Even though their original system of hosting code on abused Cloudflare Employee hosts was taken down, they have immediately pivoted to acquire gain of the decentralized, anonymous, and community mother nature of blockchain,” security scientists Nati Tal and Oleg Zaytsev mentioned.

Cybersecurity

“This marketing campaign is up and more difficult than ever to detect and consider down.”

It’s no surprise that risk actors have specific WordPress web-sites by using both destructive plugins, as properly as take gain of publicly disclosed security flaws in well known plugins to breach web-sites. This offers the ability to entirely hijack infected web sites at will.

In the most current set of attacks, the contaminated internet sites are injected with obfuscated Javascript built to query the BNB Clever Chain by developing a good agreement with an attacker-managed blockchain address.

The purpose is to fetch a second-stage script that, in transform, retrieves a third-stage payload from a command-and-management (C2) server to provide the misleading browser update notices.

Should really a sufferer click on the update button on the bogus overlay, they are redirected to download a malicious executable from Dropbox or other legit file hosting products and services.

Cybersecurity

While the address and the related agreement have been tagged as used in a phishing plan, the consequence of hosting it on a decentralized services usually means that there is at present no way to intervene and disrupt the attack chain.

“As this is not an handle used in any financial or other action that victims can be lured to transfer cash or any other variety of Intellectual residence to — visitors of compromised WordPress web sites have no clue as to what is heading on underneath the hood,” the scientists stated.

“This deal, tagged as faux, malicious, or whatnot, is however on the web and delivers the malicious payload.”

With plugins becoming a sizable attack area for WordPress, it is suggested that people relying on the content administration procedure (CMS) adhere to security finest techniques and preserve their techniques up-to-day with the most current patches, take away undesirable admin consumers, and implement strong passwords.

Identified this article interesting? Adhere to us on Twitter  and LinkedIn to read through extra distinctive written content we article.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «microsoft to phase out ntlm in favor of kerberos for Microsoft to Phase Out NTLM in Favor of Kerberos for Stronger Authentication
Next Post: Signal Debunks Zero-Day Vulnerability Reports, Finds No Evidence signal debunks zero day vulnerability reports, finds no evidence»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.