Plain Text Nostr

<-- back to main feed

thread · root 9b10aac8…af8b · depth 1 · · selected 9b10aac8…af8b

thread

root 9b10aac8…af8b · depth 1 · · selected 9b10aac8…af8b

+- jsr -- 191d ---------------------------------------------------------------------------------------------------[...]+
|                                                                                                                      |
| NEW: 🇰🇵DPRK hackers have begun hiding malware on blockchain.                                                         |
|                                                                                                                      |
| Result, decentralized, immutable malware from a government crypto theft operation.                                   |
| https://blossom.primal.net/a107de401a522d0914a28dec26d00b96e8444e3d25259e14cfaa04a023b098b4.png                      |
|                                                                                                                      |
| It only cost $1.37 USD in gas fees per malware change (e.g. to update the command & control server)                  |
|                                                                                                                      |
| https://blossom.primal.net/4ba1cadacaac86882f3363c59e5320db53dd97c6a53fe5a689e49387e81eaa36.png                      |
|                                                                                                                      |
| Blockchains as malware dead drops are a fascinating, predictable evolution for nation state attackers.               |
|                                                                                                                      |
| https://blossom.primal.net/29d96437b500d63006608b3bba6fdf5ae776c29ff697dfb7485b7aafbbbe38e7.png                      |
|                                                                                                                      |
| And Blockchain explorers are a natural target.                                                                       |
|                                                                                                                      |
| https://blossom.primal.net/4a0cb4b61499359f7d3048d03000f6cce432c7211615a8029f1f7515c379de35.png                      |
|                                                                                                                      |
| Nearly impossible to remove.                                                                                         |
| https://blossom.primal.net/816dce991b4bd694b9def92d508ae5c35f77df7fd13627ebeb5c8f223e538407.png                      |
|                                                                                                                      |
| Experimentation with putting malware on blockchains is in infancy.                                                   |
|                                                                                                                      |
| Ultimately there will be some efforts to try and implement social engineering protection around this, but combined   |
| with things like agentic AI & vibe coding by low-information people...whew boy this gold seam is going to be         |
| productive for a long time.                                                                                          |
|                                                                                                                      |
| Still, where here they used social engineering, I expect attackers to also experiment with directly loading zero     |
| click exploits onto blockchains targeting things like blockchain explorers & other systems that process              |
| blockchains... especially if they are sometimes hosted on the same systems & networks that handle transactions /     |
| have wallets.                                                                                                        |
|                                                                                                                      |
| REPORT: https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding                             |
|                                                                                                                      |
+-- reply ---------------------------------------------------------------------------------------------- [8 replies] ---+
4bc7982c4ee4 -- 191d [parent] 
|    This also a thing using ordinals - gone are the days when you hafta use finicky DNS and ded servers, set a block
|    hash to load remote exploits and yer off!
|    reply
PlebInstitute -- 191d [parent] 
|    Woah! That pretty cool.
|    reply
𝕞ptf -- 191d [parent] 
|    Are you sure it wast Jameson Lopp?
|    reply
c62ea154ea53 -- 191d [parent] 
|    lol
|    reply
a0f4ba2abbb6 -- 191d [parent] 
|    ✍️✍️
|    https://simplex.chat/contact#/?v=2-7&smp=smp%3A%2F%2F6iIcWT_dF2zN_w5xzZEY7HI2Prbh3ldP07YTyDexPjE%3D%40smp10.simp
|    lex.im%2FsYV2mEEBg_35Vyg2-0rW3-Bn9P2CR5ll%23%2F%3Fv%3D1-3%26dh%3DMCowBQYDK2VuAyEAJqIWZVzk9WmEKv7cNlqPM7hXQ2ACwLw
|    WiSiw5uTTywQ%253D%26srv%3Drb2pbttocvnbrngnwziclp2f4ckjq65kebafws6g4hy22cdaiv5dwjqd.onion
|    reply
U-P-G-R-A-Y-E-D-D -- 93d [parent] 
|    This was inevitable with Core v30
|    
|    nostr:nevent1qqsfky92ep6p2lgqs68v7pwfvcldh985fln2ju42ka7nzzgtfn22lzcpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgq3qvz0
|    3sm9qy0t93s87qx2hq3e0t9t9ezlpmstrk92pltyajz4yazhsxpqqqqqqzdfay7m
|    reply
Jordan S -- 93d [parent] 
|    North Korea installs Malware on Bitcoin while it uses Monero to avoid international sanctions.
|    nostr:nevent1qqsfky92ep6p2lgqs68v7pwfvcldh985fln2ju42ka7nzzgtfn22lzcpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhg3f8rcr
|    reply
4f47fc924859 -- 93d [parent] 
     If explorers are vulnerable:
     → fix explorers.
     Not:
     → attack decentralized storage.
     
     The real irony
     Blockchains are actually better forensic platforms than the web.
     
     Every malicious payload:
     timestamped
     indexed
     permanent
     globally visible
     
     Which makes:
     tracking attackers easier, not harder.
     
     One-liner truth
     Malware doesn’t become dangerous because of where it’s stored —
     it becomes dangerous because of how it’s executed.
     nostr:nevent1qqsfky92ep6p2lgqs68v7pwfvcldh985fln2ju42ka7nzzgtfn22lzcpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhg3f8rcr
     reply

Write a post

Sign in with a signing-capable method to publish.