Binance Smart Chain Vulnerability Exploited in ‘EtherHiding’ Malware Attack

by Dan Goodin
10 Oct 2023

"Proxy & VPN Virtuoso. With a decade in the trenches of online privacy, Dan is your go-to guru for all things proxy and VPN. His sharp insights and candid reviews cut through the digital fog, guiding you to secure, anonymous browsing."

Exploring BSC Vulnerabilities
BSC was compromised in the ‘EtherHiding’ attack.

In the intricate world of blockchain technology, Binance Smart Chain (BSC) has carved a niche for itself, becoming a beacon for developers and investors. However, its recent entanglement with the ‘EtherHiding’ malware has raised eyebrows in the cybersecurity community, prompting a deeper examination of BSC’s security protocols.

The EtherHiding Conundrum: Blockchain’s Security Paradox

The “EtherHiding” technique is not just another malware; it’s a testament to the evolving tactics of cyber adversaries. By exploiting Binance’s Smart Chain contracts, this method ingeniously embeds malicious code within the blockchain, capitalizing on its immutability.

What is the primary conduit for this attack? WordPress sites account for a staggering 43% of all websites. These sites, once compromised, redirect users to Cloudflare worker hosts. Here, they encounter meticulously crafted overlays posing as genuine browser update prompts. But beneath this facade lies a trove of malicious infostealers like Redline, Amadey, and Lumma.

This distribution strategy, termed “ClearFake,” is a masterclass in deception. It leverages compromised websites to display counterfeit browser update prompts. The real danger unfolds when users, trusting these prompts, inadvertently download malicious executables hosted on platforms like Dropbox.

Blockchain’s decentralized architecture, while revolutionary, has inadvertently provided a shield for these threat actors. Traditional cybersecurity measures falter against the blockchain’s immutable and decentralized nature, making threats like ‘EtherHiding’ particularly challenging to neutralize.

If you want to learn more about cybersecurity, view my article about protection from cybercriminals

Guardio Labs’ Revelations: A Closer Look

Guardio Labs’ research into this threat has unearthed some alarming details:

  • Compromised WordPress Sites: In just two weeks, a slew of WordPress sites, including and, fell victim to this attack.
  • Malware Variants: The diverse malware hashes associated with this campaign suggest a multi-pronged attack strategy.
  • Deceptive Filenames: The malware filenames, rife with Unicode manipulations, are designed to dupe even the most discerning users.

Protecting Against Future Threats

For cybersecurity professionals, this incident is a clarion call. It underscores the need for a multi-faceted defense strategy. If you’re managing a WordPress site, consider the following advanced measures:

  • Intrusion Detection Systems (IDS): Deploy IDS to monitor and detect malicious activities in real-time.
  • Regular Security Audits: Periodic security assessments can identify and rectify vulnerabilities before exploiting them.
  • Advanced Threat Intelligence: Stay abreast of the latest threat intelligence to anticipate and counter emerging threats.

Final Words

The ‘EtherHiding’ incident is a stark reminder of the dynamic nature of cyber threats. As we forge ahead in this digital era, the onus is on us, the cybersecurity community, to stay vigilant, continuously adapt, and fortify our defenses. The marriage of blockchain and cybersecurity is still in its honeymoon phase, and as with any relationship, there will be challenges. But with collaboration, innovation, and determination, we can navigate this complex landscape with confidence and resilience.

We use cookies on our site to ensure that we give you the best browsing experience. By continuing to browse the site, you agree to this use. For more information on how we use cookies, see our Privacy Policy.

Got IT

We added this proxy to compare list