EtherHiding: Hackers create novel way to hide malicious code in blockchains
Threat actors have worked out a way to hide malicious payloads in Binance smart contracts to lure victims into updating their browsers from fake prompts, according to cybersecurity researchers. Cybercriminals have discovered a new way to spread malware to unsuspecting users, this time, by manipulating BNB Smart Chain (BSC) smart contracts to hide malware and disseminate malicious code. A breakdown of the technique known as ‘EtherHiding’ — was shared by security researchers at Guardio Labs in an Oct. 15 report — explaining that the attack involves compromising WordPress websites by injecting code that retrieves partial payloads from the block chain contracts. The attackers hide the payloads in Binance smart contracts, essentially serving as anonymous free hosting platforms for them. Guardio Labs exposes "EtherHiding" - a new threat hiding in Binance's Smart Chain, a technique that evades detection, targeting compromised WordPress sites. Read about this game-changing met...