Home
/
News updates
/
Latest news
/

Hackers exploit blockchains as malware hubs, google warns

Hackers Try to Use Blockchains for Malware Storage | Google Issues Warning

By

Samantha Greene

Oct 20, 2025, 07:08 PM

Edited By

Maya Singh

Updated

Oct 21, 2025, 12:00 PM

2 minutes reading time

Illustration of hackers using blockchains for malware, depicting a digital network with malicious activity.
popular

Cybersecurity Tensions Rise

Google's Threat Intelligence Group revealed that hackers are utilizing open blockchains like Ethereum and BNB Smart Chain to store and distribute malware. This alarming trend, particularly among state-sponsored groups, raises critical cybersecurity concerns for developers and users alike.

The Strategy Unpacked: EtherHiding

The method known as EtherHiding lets cybercriminals insert harmful code into smart contracts. Because blockchains are decentralized, disrupting such techniques is challenging. Commenters noted that this could serve as an ever-present repository for malware, complicating defense efforts against cyber threats.

What Users are Saying

People are unpacking the implications of this trend. Some confusion arose over how this malware strategy leads to actual infections. One user pointed out,

"Whether or not you use the blockchain will not determine whether you get infected by one of these viruses. That depends on clicking suspicious links."

Others introduced new thoughts, suggesting that malware might even hide in multimediaโ€”"Some malwares are hidden in videos, activated when played by unsecured players."

This raises valid concerns about how vulnerabilities in software can exacerbate the problem.

Challenges in Addressing Cyberthreats

Discussions indicate that as the popularity of public blockchains grows, so do associated risks. With existing antivirus solutions focusing on direct memory and process analysis, this unique storage method presents a fresh challenge.

"The decentralized nature makes it tough to block every IP. When one node fails, another is still functioning," noted another observer.

Most commenters are skeptical but acknowledge the real hazards presented by this dormant code. Notably, they argued that initially benign malware can evolve into harmful entities, especially when off-chain software mishandles the data.

Key Insights and Warnings

  • โ–ฝ Hackers are embedding malware into blockchains, raising serious cybersecurity alarms.

  • โš ๏ธ EtherHiding contributes to undetectable storage, complicating malware detection.

  • ๐Ÿ’ก User perspectives vary, but many recognize the potential for abuse.

The Road Ahead for Cybersecurity

Experts warn that the increase in EtherHiding could drive cybersecurity specialists to readjust their strategies swiftly. Reports suggest that up to 60% of new malware may start leveraging these blockchain technologies within the next 18 months. As people become increasingly aware of these risks, there's an expectation of a surge in specialized antivirus solutions to target blockchain-stored malware.

This trend suggests a perpetual race where advancements in cyber threats consistently outpace defenses.

Echoes of Cybersecurity History

Interestingly, this situation draws parallels to the email exploitation saga of the late 1990s, when spammers first utilized that medium to distribute mass unsolicited messages. As with those early email troubles, the current wave of blockchain exploitation is generating similar uncertainty and chaos. Just as society adapted back then, new methods will be necessary to combat the dual-use nature of blockchain technology.

The ongoing struggle between innovation and exploitation reveals a repeating cycle in technology, urging all stakeholders to reconsider safety strategies in this ever-challenging digital landscape.