1. Home
  2. wordpress

wordpress

EtherHiding: Why hackers may prefer Binance’s BNB Smart Chain

According to cybersecurity analysts at 0xScope and CertiK, threat actors may prefer using BNB Smart Chain contracts because it’s cheaper and seen as having lower security than Ethereum.

Despite the name “EtherHiding,” the new attack vector that hides malicious code in blockchain smart contracts doesn’t have much to do with Ethereum at all, cybersecurity analysts have revealed.

As reported by Cointelegraph on Oct. 16, EtherHiding has been discovered as a new way for bad actors to hide malicious payloads inside smart contracts — with the ultimate goal of distributing malware to unsuspecting victims.

These cybercriminals tend to prefer using Binance’s BNB Smart Chain, it is understood.

Speaking to Cointelegraph, a security researcher from blockchain security firm CertiK, Joe Green, said most of this is due to BNB Smart Chain’s lower costs.

“The handling fee of BSC is much cheaper than that of ETH, but the network stability and speed are the same because each update of JavaScript Payload is very cheap meaning there’s no financial pressure.”

EtherHiding attacks are initiated by hackers compromising WordPress websites and injecting code that pulls partial payloads buried in Binance smart contracts. The website’s front end is replaced by a fake update browser prompt which when clicked pulls the JavaScript payload from the Binance blockchain.

The actors frequently change the malware payloads and update website domains to evade detection. This allows them to continuously serve users fresh malware downloads disguised as browser updates, Green explained.

Screenshot of malware updates being deployed in BSC smart contract. Source: Certik 

Another reason, according to security researchers at Web3 analytics firm 0xScope, could be because of increased security-related scrutiny on Ethereum.

"While we are unlikely to know the EtherHiding hacker's true motives for using BNB Smart Chain over other blockchains for their scheme, one possible factor is the increased security-related scrutiny on Ethereum.”

Hackers may face higher risks of discovery by injecting their malicious code using Ethereum due to systems such as Infura’s IP address tracking for MetaMask transactions, they said.

Related: Crypto investors under attack by new malware, reveals Cisco Talos

The 0xScope team told Cointelegraph they recently tracked the money flow between hacker addresses on BNB Smart Chain and Ethereum.

Key addresses were linked to NFT marketplace OpenSea users and Copper custody services, it reported.

Payloads were updated daily across 18 identified hacker domains. This sophistication makes EtherHiding hard to detect and stop, the firm concluded.

Magazine: Should crypto projects ever negotiate with hackers? Probably

Bitcoin at $84K: Ten Global Events That Could Make or Break Crypto Markets

EtherHiding: Hackers create novel way to hide malicious code in blockchains

Threat actors have worked out a way to hide malicious payloads in Binance smart contracts to lure victims into updating their browsers from fake prompts, according to cybersecurity researchers.

Cybercriminals have discovered a new way to spread malware to unsuspecting users, this time by manipulating BNB Smart Chain (BSC) smart contracts to hide malware and disseminate malicious code.

A breakdown of the technique known as “EtherHiding” was shared by security researchers at Guardio Labs in an Oct. 15 report, explaining that the attack involves compromising WordPress websites by injecting code that retrieves partial payloads from the blockchain contracts.

The attackers hide the payloads in BSC smart contracts, essentially serving as anonymous free hosting platforms for them.

The hackers can update the code and change the attack methods at will. The most recent attacks have come in the form of fake browser updates, where victims are prompted to update their browsers using a fake landing page and link.

The payload contains JavaScript that fetches additional code from the attacker’s domains. This eventually leads to full site defacement with fake browser update notices that distribute malware.

This approach allows the threat actors to modify the attack chain by simply swapping out malicious code with each new blockchain transaction. This makes it challenging to mitigate, according to Nati Tal, head of cybersecurity at Guardio Labs, and fellow security researcher Oleg Zaytsev.

Once the infected smart contracts are deployed, they operate autonomously. All Binance can do is rely on its developer community to flag malicious code in contracts upon discovery.

Contract address flagged for scam activity. Source: Guard.io

Guardio stated that website owners using WordPress, which runs roughly 43% of all websites, need to be extra vigilant with their own security practices before adding:

“WordPress sites are so vulnerable and frequently compromised, as they serve as primary gateways for these threats to reach a vast pool of victims.”

Related: Crypto investors under attack by new malware, reveals Cisco Talos

The firm concluded that Web3 and blockchain bring new possibilities for malicious campaigns to operate unchecked. “Adaptive defenses are needed to counter these emerging threats,” it said.

Magazine: Blockchain detectives — Mt. Gox collapse saw birth of Chainalysis

Bitcoin at $84K: Ten Global Events That Could Make or Break Crypto Markets

Bitcoin Cash Payment Processor Evolves Adding URL Shortener, Paypal API Integration

Bitcoin Cash Payment Processor Evolves Adding URL Shortener, Paypal API IntegrationPrompt.cash, a bitcoin cash noncustodial payment processor, is adding a bunch of interesting functionalities. The payment processor now features a URL shortener that allows users to monetize content on any site on the net. Also, Prompt.cash added Paypal API integrations, making it easier for merchants to test Bitcoin Cash payments seamlessly. Prompt.cash Adds URL Shortener […]

Bitcoin at $84K: Ten Global Events That Could Make or Break Crypto Markets