header banner
Default

Malicious code is being concealed by hackers in Binance Smart Chain contracts


blockchain
(Image credit: Shutterstock / Venomous Vector)

Hackers have been observed hosting malicious code on Binance’s Smart Chain and dropping it to people via smart contracts.

This tactic makes the malware campaign infinitely more resilient and tougher to take down, with the researchers who found it - Guardio Labs - describing it as the “next level of bulletproof hosting”.

Binance is one of the world’s most popular cryptocurrency exchanges, and has its own blockchain, called the Binance Smart Chain, which is essentially a competitor to Ethereum - a world computer that can be used to create and host decentralized apps (dApps). It also has lower fees and faster transaction times compared to Ethereum (because of, among other things, Ethereum being arguably more popular and more used). Smart contracts are programs stored on the blockchain that run when certain conditions are met.

Blockchains and smart contracts

First, the hackers' campaign, dubbed EtherHiding, finds a vulnerable WordPress site. It may have an easy-to-guess password or a flawed and outdated add-on through which they obtain access. Then, they create an overlay on that website, warning the visitors that their browser is outdated and that a patch is necessary in order to view the contents of the site. They also add an obfuscated JavaScript code that creates a smart contract and queries the Binance Smart Chain.

If the victim clicks on the download button, the script runs, creates the smart contract and fetches a malicious script hosted on the blockchain. 

“This is what we see here in this attack — malicious code is hosted and served in a manner that can’t be blocked,” the researchers explain. “Unlike hosting it on a Cloudflare Worker service as was mitigated on the earlier variant. Truly, it is a double-edged sword in decentralized tech.”

Ultimately, the victims will install an infostealer on their endpoints, be it Amadey, Lumma, or RedLine.

Unfortunately, there’s very little anyone can do about it, other than just flag the associated Binance Smart Chain addresses and contracts as malicious and used in a phishing campaign. 

More from TechRadar Pro

  • Security professionals are being overworked - and that's a huge problem
  • Here's a list of the best firewalls today
  • These are the best identity theft protection tools right now

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Sources


Article information

Author: Gregory Butler

Last Updated: 1698695282

Views: 1562

Rating: 4.5 / 5 (48 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Gregory Butler

Birthday: 1924-03-03

Address: 22067 Jenny Park Apt. 732, New Luis, CT 51777

Phone: +3830032796941371

Job: Nurse

Hobby: Running, Amateur Radio, Knitting, Fishing, Kite Flying, Rock Climbing, Gardening

Introduction: My name is Gregory Butler, I am a valuable, vivid, proficient, fearless, striking, unwavering, persistent person who loves writing and wants to share my knowledge and understanding with you.