TI Mindmap HUB
Threat Intelligence Report

DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog

๐Ÿ“… October 17, 2025 ๐Ÿ“ฐ cloud.google.com ๐Ÿ” 0 CVE(s) referenced

North Korean threat actors are pioneering the use of blockchain-based EtherHiding to stealthily deliver malware and steal cryptocurrency, leveraging the resilience, anonymity, and flexibility of smart contracts to evade traditional detection and takedown methods.

vendor

Sign in to access the full report including:
detailed analysis, IOCs, MITRE ATT&CK mapping, and STIX bundle.

๐Ÿ” Sign In to Read Full Report

You'll need to accept our Terms of Service to access the platform.

๐Ÿ“Š Visual Mindmap
๐ŸŽฏ IOC Extraction
โš”๏ธ MITRE ATT&CK TTPs
๐Ÿ“ฆ STIX 2.1 Bundle