As if we needed more things to put on the blockchain… Throughout 2025, cybersecurity and tech vendors have sounded the alarm about an adversarial tactic called EtherHiding. This stealthy attack buries malware components in smart contracts on the blockchain ledger. The attack is a tricky one for defenders to mitigate, given how the blockchain is decentralized and often spread across an immense network, with many potential points for a multi-stage attack. Over the past few years, software developer interest in Web3, which attempts to build decentralized online ecosystems using blockchain technology, has only increased the potential attack surface for exploits like EtherHiding. “These attack chains are becoming increasingly more difficult. Even if you don’t have a particular interest in Web3 or an application for it, understanding how this type of attack works can help to inform your posture and not only your policies, but also your training,” Andrew Northern, principal security researcher with internet intel platform Censys, told IT Brew. IT pros shared seeking strategies here.—BH |