BotBeat
...
← Back

> ▌

Canadian Centre for Cyber SecurityCanadian Centre for Cyber Security
POLICY & REGULATIONCanadian Centre for Cyber Security2026-03-31

Canadian Cyber Centre Warns of EtherHiding Campaign: Malware Hidden in Blockchain, Targeting Developer Toolchains

Key Takeaways

  • ▸EtherHiding leverages blockchain technology to host and distribute malware, exploiting the transparency of cryptocurrency transaction data as a covert command-and-control channel
  • ▸The attack specifically targets developer toolchains by embedding malicious code in configuration files (tailwind.config.js) and exploiting Node.js runtimes in VS Code and Cursor AI
  • ▸The InvisibleFerret backdoor enables remote code execution, file theft, persistence mechanisms, and direct C2 communication, posing severe risks to AI and software development projects
Source:
Hacker Newshttps://www.cyber.gc.ca/en/news-events/etherhiding-trojan-your-toolchain↗

Summary

The Canadian Centre for Cyber Security has issued a detailed alert regarding an active campaign exploiting blockchain technology to covertly host and distribute malware through a technique dubbed EtherHiding. The threat actor inserted malicious JavaScript code into a Tailwind CSS configuration file (tailwind.config.js) hidden among thousands of whitespace characters, bypassing typical code review processes. When developers interact with the compromised repository, the payload triggers within the Node.js runtime environment embedded in Visual Studio Code or Cursor AI, executing a sophisticated backdoor known as InvisibleFerret. The backdoor is designed for covert operations including file theft, directory exfiltration, and command execution via a command-and-control server. The Cyber Centre's analysis reveals a multi-stage attack chain where the malicious JavaScript retrieves cryptocurrency transaction hashes, triggering a cascade of downloaders and additional payloads that establish persistent unauthorized access to developer machines. The attack demonstrates a sophisticated understanding of developer workflows and modern AI development tools, representing a significant supply chain security risk.

  • The technique uses obfuscation (whitespace padding) and legitimate development frameworks to evade detection during code reviews, highlighting supply chain vulnerabilities
  • Defenders should implement strict code review processes, monitor for suspicious commits in private repositories, and audit dependencies for unauthorized modifications
CybersecurityAI Safety & Alignment

Comments

Suggested

OracleOracle
POLICY & REGULATION

AI Agents Promise to 'Run the Business'—But Who's Liable When Things Go Wrong?

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Anthropic Explores AI's Role in Autonomous Weapons Policy with Pentagon Discussion

2026-04-05
SourceHutSourceHut
INDUSTRY REPORT

SourceHut's Git Service Disrupted by LLM Crawler Botnets

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us