UNC5142 Exploits Blockchain to Infect 14,000 WordPress Sites with Malware

Threat actor UNC5142 has compromised over 14,000 WordPress sites using the EtherHiding technique, exploiting BNB Smart Chain smart contracts to distribute info-stealing malware like Atomic and Vidar. This blockchain method ensures persistence and evades detection. Similar tactics appear in North Korean operations. Experts urge immediate plugin updates and blockchain monitoring for defense.
UNC5142 Exploits Blockchain to Infect 14,000 WordPress Sites with Malware
Written by Corey Blackwell

In a sophisticated cyber campaign that has compromised over 14,000 WordPress websites, a threat actor tracked as UNC5142 is exploiting blockchain technology to distribute malware on a global scale. Security researchers have uncovered how this group hacks into vulnerable WordPress sites, injecting malicious code that leverages smart contracts on the BNB Smart Chain to deliver information-stealing payloads. The technique, dubbed EtherHiding, allows attackers to hide malware in plain sight within the immutable structure of blockchain, making it exceptionally difficult for victims or defenders to remove or alter the threats once deployed.

The operation begins with the exploitation of flaws in WordPress plugins and themes, enabling UNC5142 to gain unauthorized access and embed JavaScript droppers. These droppers then pull encrypted code from blockchain smart contracts, which serve as resilient hosting mechanisms. Unlike traditional servers that can be taken down, blockchain’s decentralized nature ensures the malware remains accessible indefinitely, as long as the chain operates.

Unpacking the EtherHiding Technique

According to a detailed analysis from The Hacker News, UNC5142’s method involves multi-stage loaders that decrypt and execute stealers like Atomic, Lumma, or Vidar on infected devices, targeting credentials, cryptocurrency wallets, and sensitive data. This financially motivated group, distinct from nation-state actors, has been active since late 2023, with campaigns scaling up dramatically in recent months. The use of blockchain not only evades detection but also complicates attribution, as transactions on public ledgers can be traced but often lead to anonymous wallets.

Google’s Threat Intelligence Group, in a report published on their Cloud Blog, highlights how UNC5142 abuses the BNB Smart Chain’s smart contracts to store and distribute these payloads. The group’s innovation lies in embedding adaptive malware that evolves based on victim environments, affecting both Windows and macOS systems. This cross-platform capability broadens the attack surface, ensnaring users who visit compromised sites through deceptive ads or redirects.

North Korean Connections and Broader Implications

Adding a layer of geopolitical intrigue, similar EtherHiding tactics have been adopted by North Korean hackers, such as UNC5342, for espionage and financial gains, as noted in another Google Cloud Blog entry. While UNC5142 appears criminally driven, the overlap suggests a diffusion of advanced techniques among threat actors. Posts on X (formerly Twitter) from cybersecurity accounts like Cybersecurity News Everyday echo this, describing ongoing infections where compromised WordPress sites reinfect visitors via blockchain-hosted scripts, with view counts indicating widespread industry concern.

The scale of the breach is staggering: over 14,000 sites, as reported by Mashable, serve as unwitting vectors, often luring users with fake software updates or browser extensions. Defenders face challenges in mitigation, as patching WordPress vulnerabilities alone doesn’t address the blockchain persistence. Experts recommend monitoring for unusual JavaScript injections and using tools like blockchain explorers to flag suspicious contracts.

Defensive Strategies and Future Threats

Industry insiders are urging WordPress administrators to update plugins immediately and implement web application firewalls to detect anomalous code. A post from Dark Web Informer on X warns of related vulnerabilities like CVE-2025-3776, which could enable full site takeovers, amplifying the risk. Meanwhile, blockchain platforms are under scrutiny; as GovInfoSecurity points out, the same technology hailed for security in finance is now a double-edged sword in cybercrime.

Looking ahead, this campaign underscores the need for hybrid defenses that span traditional web security and blockchain forensics. UNC5142’s success may inspire copycats, potentially leading to more widespread abuse of decentralized technologies. Security firms like Mandiant, referenced in Google reports, are tracking evolutions, but the cat-and-mouse game continues, with attackers one step ahead in exploiting emerging tech for illicit gains.

Evolving Tactics in Cybercrime

Recent news from GBHackers details how North Korean groups have refined EtherHiding for crypto theft, blending it with phishing lures. For UNC5142, the focus remains on info-stealers, with payloads encrypted in three AES layers to thwart analysis. X discussions, including from accounts like Shah Sheikh, amplify alerts about the global reach, urging vigilance among site owners.

As this threat evolves, collaboration between web hosts, blockchain developers, and cybersecurity teams will be crucial. The incident serves as a stark reminder that innovation in one domain can fuel disruption in another, demanding proactive measures to safeguard digital ecosystems.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us