What Is A Left-Translated Bitcoin Market Cycle?
It's possible that a flood of institutional capital could push BTC to an early cycle high.
Security experts have identified a new technique that manipulates blockchain contracts to disseminate malware through counterfeit browser updates.
A new type of cyberattack has emerged that exploits properties of Binance Smart Chain. The new method, called "EtherHiding," doesn't just disseminate malware; it hides it within smart contracts on the blockchain. The technique is so sophisticated it has left cybersecurity professionals stumped. Bizarrely, WordPress website owners are the ones who should be most concerned.
🚨 Guardio Labs exposes "EtherHiding" - a new threat hiding in Binance's Smart Chain, a technique that evades detection, targeting compromised WordPress sites. Read about this game-changing method! @BNBCHAIN #BNBChain #CyberSecurity https://t.co/alNI5KqKUO
— Guardio (@GuardioSecurity) October 15, 2023
In this new wave of cyberattacks, hackers compromise WordPress sites and then trigger fake browser update prompts to lure in victims. These prompts contain hidden JavaScript that fetches additional malware, disguised in blockchain transactions. The digital miscreants can alter this code dynamically, which makes defending against it incredibly challenging.
What's most unsettling is that once these malicious smart contracts are live on the blockchain, they're essentially autonomous. The onus then falls on the Binance developer community to identify and flag the rogue contracts. This has led experts to call for a rethink of current security measures, especially given how prevalent WordPress is as a platform.
Since WordPress is the platform of choice for a significant portion of websites, its vulnerability in this new form of attack is concerning. The underlying issue is that the blockchain, with all its promise and potential, also offers new avenues for cybercrime that are less understood and harder to guard against.
In conclusion, EtherHiding represents an evolutionary step in the capabilities of cybercriminals. As we move deeper into the Web3 era, it's clear that traditional defense mechanisms may no longer be enough. A proactive and adaptable cybersecurity strategy is essential in this new landscape.
Subscribe to our newsletter and follow us on Twitter.
Everything you need to know about Blockchain, Artificial Intelligence, Web3 and Finance.