New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads

A new era of web-delivered malware has arrived with EtherHiding, a technique that fundamentally reshapes how attackers distribute and rotate malicious payloads.

Unlike traditional threats that rely on static staging servers or disposable redirect chains, EtherHiding leverages smart contracts on the Binance Smart Chain (BSC) testnet, enabling attackers to update or rotate malicious payloads instantly without ever touching the compromised site.

This model relies on decentralized on-chain storage, browser-based execution, and social engineering tactics that bypass most conventional detection layers.

At the core of EtherHiding’s delivery chain is the use of blockchain-based smart contracts for payload retrieval.

The attack starts on a compromised website, where malicious JavaScript is injected disguised behind a counterfeit CAPTCHA page.

Victims are prompted to “prove they are human,” a lure that instructs users to copy attacker-supplied code and execute it locally through Terminal (macOS) or the Windows Run dialog.

This hands-on approach, known as the Click-Fix technique, shifts execution to the user, sidestepping many behavioral defenses and sandbox detections.

The loader script leverages the Ethers.js library to interact directly with on-chain contracts from the victim’s browser.

There are no hardcoded payload URLs; instead, each visitor triggers a live contract query, retrieving up-to-date, obfuscated, and platform-aware malware stages.

The use of blockchain means payload updates are deployed with inexpensive, gas-funded transactions rapid, stealthy, and nearly impossible to block at the web layer.

The EtherHiding Attack Chain: Step by Step

1. Regulated Execution and Payload Rotation

Once the fake CAPTCHA lure is activated, the browser decodes injected JavaScript, which detects headless browsers and determines the client’s OS.

The macOS specific Click-Fix lure.

This information is then used to select an OS-specific smart contract (e.g., one for Windows, another for macOS), ensuring tailored payloads.

Decoded smart contract stage 1.
Decoded smart contract stage 1.

A “gate” contract enforces further control: only victims with authorized cookies are permitted to progress, allowing attackers to enable, throttle, or disable delivery on-demand, all through blockchain transactions.

2. OS-Specific Exploitation Pathways

  • macOS: Victims receive clipboard commands instructing them to run a curl-to-bash installer that persists via LaunchAgents and harvests credentials using deceptive prompts. The payload dynamically resolves its command-and-control (C2) domains by scraping Telegram and Steam profiles, evading static domain blocklists and enabling real-time agility.
  • Windows: Instructions direct users to paste into the Run dialog, invoking MSHTA for remote retrieval and silent execution again depending on user action rather than browser exploits.

Common payloads delivered using this chain include the Amos Stealer and Vidar malware families, both known for credential theft and system profiling.

Fake CAPTCHA overlays have become a consistent social engineering vector, exploiting user trust in familiar verification pages.

Censys telemetry reports that in a single month, over 1,500 web properties were observed hosting such lures many harnessing blockchain-based logic as seen in EtherHiding.

Unlike previous threats reliant on domain churn (e.g., SocGholish), EtherHiding’s use of smart contracts decentralizes the pivot point: the same contract address is reused across many injected sites, while only the contract’s storage is altered to update or rotate payloads.

Detection opportunities thus shift, with emphasis on spotting Ethers library usage or abnormal reCAPTCHA asset reuse in web source code.

An initial fake CAPTCHA lure.
An initial fake CAPTCHA lure.

Defending against EtherHiding and similar blockchain backed threats requires a paradigm shift:

  • Host-Level: Monitor for clipboard-to-shell activity, suspicious Terminal or MSHTA executions, and the creation of persistence agents, especially following unusual CAPTCHA pages.
  • Network-Level: Look for browser-originated RPC calls, large hex-encoded payloads, or Ethers.js imports within non-crypto domains.
  • Threat Hunting: Search for uncommon HTML patterns, including dynamic hex decoding and smart contract lookups, combined with social engineering lures.

EtherHiding signals a clear transition toward decentralized, agile, and user-driven malware delivery. As these tactics mature, defenders must adapt visibility and detection to intersect blockchain logic, social lures, and emergent behavioral sequences.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link