Frequently Asked Questions

Product Information & EtherHiding Simulation

What is EtherHiding and why is it significant for cybersecurity?

EtherHiding is a technique where malicious payloads are embedded within blockchain smart contracts, allowing attackers to persist and distribute malware without maintaining dedicated infrastructure. This approach leverages the decentralized and tamper-resistant nature of blockchains, making takedown nearly impossible and enabling covert command-and-control operations that can bypass traditional network or antivirus controls. (Source: Cymulate Blog, Dec 15, 2025)

How does Cymulate simulate EtherHiding attacks?

Cymulate has developed new attack scenarios that simulate EtherHiding by extracting and running concealed payloads stored in blockchain smart contracts. These scenarios are production-safe and allow customers to test their security controls, such as EDR and SIEM, against blockchain-based threats. The simulation retrieves payloads based on the target operating system and executes them, demonstrating the risks of decentralized malware delivery. (Source: Cymulate Blog, Dec 15, 2025)

What are the main risks associated with blockchain-based malware like EtherHiding?

Blockchain-based malware poses significant risks, including persistence of malicious payloads, difficulty in takedown due to decentralization, and the ability to bypass traditional security controls. Attackers can use blockchain as a resilient command-and-control server, enabling covert operations and challenging current SOC detection capabilities. (Source: Cymulate Blog, Dec 15, 2025)

How can organizations mitigate the risks of EtherHiding and similar blockchain threats?

To mitigate EtherHiding risks, organizations should expand monitoring to include blockchain/RPC retrieval activities, integrate blockchain indicators into threat intelligence, and implement RPC whitelisting. Enhanced client-side protection and deeper visibility into Web3 interactions are also recommended. (Source: Cymulate Blog, Dec 15, 2025)

Where can Cymulate customers find the EtherHiding attack simulation?

Cymulate customers can access the EtherHiding attack simulation under the name “Run Hidden Payload Stored in Blockchain” within the Cymulate platform. (Source: Cymulate Blog, Dec 15, 2025)

What other Web3 threats does Cymulate simulate?

Cymulate assessment templates, threat feeds, and attack scenario workbench include live-data testing for Web3 threats such as crypto mining and crypto theft. The new EtherHiding scenarios expand coverage to broader attack tactics like command-and-control, persistence, and remote code execution. (Source: Cymulate Blog, Dec 15, 2025)

How does blockchain's decentralized nature impact malware detection and mitigation?

Blockchain's decentralized and tamper-resistant characteristics make it difficult to detect and eliminate malicious payloads. Attackers can host malware that remains accessible and resistant to takedown, challenging traditional security controls and requiring new defensive strategies. (Source: Cymulate Blog, Dec 15, 2025)

What is a smart contract and how is it used in EtherHiding attacks?

A smart contract is a collection of code and functions residing at a specific blockchain address. In EtherHiding attacks, malicious payloads are stored within smart contracts, allowing attackers to retrieve and execute code from the blockchain, bypassing traditional security mechanisms. (Source: Cymulate Blog, Dec 15, 2025)

How does Cymulate's simulation help organizations prepare for blockchain-based threats?

Cymulate's simulation enables organizations to test their security controls against blockchain-based threats like EtherHiding, providing actionable insights into their ability to detect and respond to decentralized malware delivery. This helps organizations strengthen their defenses and adapt to evolving threat landscapes. (Source: Cymulate Blog, Dec 15, 2025)

What programming languages and tools are used in EtherHiding attack simulations?

EtherHiding attack simulations involve smart contracts written in Solidity and retrieval scripts using Python with the Web3 library. These tools enable interaction with blockchain networks and extraction of payloads for testing security controls. (Source: Cymulate Blog, Dec 15, 2025)

How does the blockchain consensus mechanism affect the persistence of malicious payloads?

Blockchain consensus mechanisms, such as proof-of-stake, make it extremely difficult to alter or remove malicious payloads once they are recorded. Changing a block requires consensus from a majority of validators, making payloads highly persistent and resistant to deletion. (Source: Cymulate Blog, Dec 15, 2025)

What is the role of RPC methods in EtherHiding attacks?

RPC (Remote Procedure Call) methods, such as eth_call, are used by malware to retrieve payloads from blockchain smart contracts without creating transactions. Monitoring RPC activities can help detect and contain blockchain-based threats. (Source: Cymulate Blog, Dec 15, 2025)

How does Cymulate's platform support custom attack chain building?

Cymulate Exposure Validation makes advanced security testing fast and easy, allowing users to build custom attack chains and simulate innovative threats like EtherHiding. The platform provides a unified interface for creating and running complex attack scenarios. (Source: Cymulate Blog, Dec 15, 2025)

Who is Ruben Enkaoua and what is his role at Cymulate?

Ruben Enkaoua is a cybersecurity researcher at Cymulate with expertise in Windows internals and offensive security. He contributes to Cymulate's research and development of advanced attack simulations, sharing practical knowledge to improve security resilience across industries. (Source: Cymulate Blog, Dec 15, 2025)

How can I learn more about Cymulate's approach to exposure management?

You can learn more about Cymulate's exposure management platform and continuous threat validation by reading their whitepaper at Exposure Management Platform CTEM. (Source: Cymulate Blog, Dec 15, 2025)

Where can I find Cymulate's case studies and customer success stories?

Cymulate's case studies and customer success stories are available at Cymulate Customers, showcasing real-world outcomes and industry-specific solutions. (Source: Cymulate Blog, Dec 15, 2025)

How can I schedule a demo of Cymulate's platform?

You can schedule a personalized demo of Cymulate's platform by visiting Book a Demo. (Source: Cymulate Blog, Dec 15, 2025)

Where can I find Cymulate's blog and latest research?

Cymulate's blog, featuring the latest threats and research, is available at Cymulate Blog. (Source: Cymulate Blog, Dec 15, 2025)

Features & Capabilities

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, unified platform integration (BAS, CART, Exposure Analytics), attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. (Source: https://cymulate.com/platform/)

Does Cymulate support full kill-chain attack simulations?

Yes, Cymulate provides a wide range of full kill-chain attack simulations, covering threats like ransomware, malware, APT groups, CVEs, and MITRE ATT&CK TTPs for comprehensive visibility into organizational threat exposure. (Source: https://cymulate.com/cymulate-vs-competitors/)

What integrations does Cymulate offer?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit Partnerships and Integrations. (Source: https://cymulate.com/cymulate-technology-alliances-partners/)

How easy is Cymulate to implement and use?

Cymulate is designed for quick, agentless deployment with minimal resources required. Customers report that implementation is fast and intuitive, with actionable insights available after just a few clicks. Robust support and educational resources are provided to optimize usage. (Source: manual, customer testimonials)

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive interface, user-friendly dashboard, and immediate value. Testimonials highlight easy implementation, accessible support, and actionable insights for improving security posture. (Source: https://cymulate.com/customers/cymulate-for-all-industries-customers-quotes/)

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected for testing. For a detailed quote, schedule a demo at Book a Demo. (Source: manual)

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. (Source: https://cymulate.com/security-at-cymulate/)

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and annual third-party penetration tests. GDPR compliance and dedicated privacy/security teams are also in place. (Source: https://cymulate.com/security-at-cymulate/)

Use Cases & Benefits

Who can benefit from Cymulate's platform?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and vulnerability management teams across organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. (Source: https://cymulate.com/roles-ciso-cio/)

What measurable outcomes have Cymulate customers achieved?

Customers have reported up to a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. Case studies are available at Cymulate Customers. (Source: https://cymulate.com/customers/)

What pain points does Cymulate address for security teams?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. (Source: manual)

Competition & Comparison

How does Cymulate differ from similar products in the market?

Cymulate stands out with its unified platform integrating BAS, CART, and Exposure Analytics, continuous threat validation, AI-powered optimization, full kill chain coverage, ease of use, proven results, continuous innovation, and extensive threat library. Solutions are tailored for different user segments. (Source: https://cymulate.com/cymulate-vs-competitors/)

Support & Resources

Where can I find resources like reports, blogs, and webinars from Cymulate?

Resources are available in Cymulate's Resource Hub, including blogs, newsroom, events, webinars, and product information. (Source: https://cymulate.com/resources/)

How can I stay updated with Cymulate's latest news and research?

Stay informed by visiting Cymulate's company blog and Newsroom for the latest threats, research, media mentions, and press releases. (Source: https://cymulate.com/news/)

Where can I find information about Cymulate's events and webinars?

Information about live events and webinars is available on Cymulate's Events & Webinars page. (Source: https://cymulate.com/events/)

Company Information

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity strategies. (Source: https://cymulate.com/about-us/)

What is Cymulate's company size and customer base?

Cymulate serves organizations of all sizes, from small enterprises to large corporations with over 10,000 employees, across industries such as finance, healthcare, retail, media, transportation, and manufacturing. (Source: https://cymulate.com/about-us/)

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Simulating EtherHiding: Blockchain as a Malware 

By: Ruben Enkaoua

Last Updated: March 17, 2026

cover image Simulating EtherHiding: Blockchain as a Malware

Executive summary

Following the discovery of the North Korea-based EtherHiding attack technique headlining a recent rise of blockchain abuse for malware delivery, Cymulate Research Labs analyzed and simulated the technique. EtherHiding embeds malicious payloads within the blockchain to persist and distribute malware without requiring attackers to maintain dedicated infrastructure.  

By leveraging decentralized solutions, attackers can distribute malware, gain persistence and challenge censorship, since takedown is almost impossible in Web3. The risk is meaningful as payloads remain accessible, bypassing traditional network or AV controls, and supporting covert C2 or staged payload assembly that current SOC capabilities may struggle to detect. 

To mitigate these threats, we recommend expanding monitoring to include blockchain/RPC retrieval activities, integrating blockchain indicators into threat intelligence and implementing RPC whitelisting to help identify and contain operations involving Web3 payload retrievals. 

Our research and analysis of EtherHiding led us to build and release new attack scenarios for production-safe, live data testing that runs hidden payload stored in blockchain. 

The simulation of web3 threats is not new to Cymulate. Cymulate assessment templates, threat feed and attack scenario workbench already include live-date testing for threats like crypto mining and crypto theft. The new attack scenarios simulating EtherHiding provide expanded coverage of innovative web3 threats not associated with crypto and apply to the broader attack tactics and techniques of C2, persistence and remote code execution. 

What is EtherHiding? Why does it matter? 

A blockchain is a distributed ledger with growing lists of records (blocks) securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data, forming a chain, with each additional block linking to the ones before it.  

Consequently, blockchain transactions are resistant to alteration because, once recorded, the data in any given block cannot be changed retroactively without altering all subsequent blocks and obtaining network consensus to accept these changes. 

According to a recent Google report, nation-state threat actors from North Korea were observed using EtherHiding to store and retrieve malicious payloads within smart contracts on a public blockchain like BNB Smart Chain or Ethereum.  

This approach essentially turns the blockchain into a decentralized and highly resilient command-and-control (C2) server. Also, the technique was observed to be used to deploy malicious JavaScript to manipulate users into executing malicious code. 

To understand the attack process, we built an attack scenario for Cymulate customers to simulate the new technique against their security controls like endpoint detection and response (EDR) and security information and event management (SIEM). The new Cymulate attack scenario extracts and runs a concealed payload embedded within a blockchain smart contract. By abusing the blockchain’s decentralized and tamper-resistant characteristics, attackers can host malicious payloads that are challenging to detect or eliminate.  

The payload is retrieved according to the target operating system and then executed, which may result in unauthorized actions, data theft, execution or persistence. This example underscores the dangers of executing code from decentralized sources and the complexities involved in detecting and mitigating blockchain-based cyber threats. 

EtherHiding attack details 

The “blockchain” is in fact composed of blocks of data, stored in consecutive groups. Transaction data must be added to a block to be validated. These blocks form a chain, assuming that each block cryptographically references its parent. To change a block, all subsequent blocks must change, which require the consensus of the entire network.  

We can understand how it works from this simulation by Anders Brownworth. 

By changing block #2, all blocks since then are invalidated. Ethereum for example uses a proof-of-stake based consensus mechanism, so changing block #2 would require recreating a new chain from this block and getting validators to sign new blocks to replace that history.  

Assuming the attacker wouldn’t get the consensus of at least 66% of the validators, the alternate history will not be finalized and therefore will be rejected. 

Programs can also run on Ethereum blockchain. These are called “smart contracts.” It is a collection of code and functions that reside at a specific address. 

The following Solidity smart contract stores on the testnet the string Ruben: 

NameStorage.sol 

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;

contract NameStorage {
    bytes private name;

    constructor(bytes memory _name) {
        name = _name;
    }

    function getName() public view returns (bytes memory) {
        return name;
    }
}

Deploy.s.sol 

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;

import "forge-std/Script.sol";
import "../src/NameStorage.sol";

contract DeployNameStorage is Script {
    function run() external {

        uint256 deployerPrivateKey = vm.envUint("PRIVATE_KEY");

        vm.startBroadcast(deployerPrivateKey);

        bytes memory myName = bytes("Ruben");
        NameStorage nameStorage = new NameStorage(myName);

        vm.stopBroadcast();

        console.log("Contract deployed at:", address(nameStorage));
    }
}

By running the following script, the name can be retrieved: 

from web3 import Web3

RPC_URL = "https://ethereum-sepolia.publicnode.com"
CONTRACT_ADDRESS = "0xaE3Ba9d7C1374234b29525AE1EA07Ea93D30F5eD"

CONTRACT_ABI = [
    {
        "inputs": [],
        "name": "getName",
        "outputs": [{"internalType": "bytes", "name": "", "type": "bytes"}],
        "stateMutability": "view",
        "type": "function",
    }
]

def main():
    print("[+] Connecting to Ethereum node ...")
    w3 = Web3(Web3.HTTPProvider(RPC_URL))
    if not w3.is_connected():
        raise SystemExit("[!] Failed to connect")

    print("[+] Preparing contract handle ...")
    contract = w3.eth.contract(
        address=Web3.to_checksum_address(CONTRACT_ADDRESS),
        abi=CONTRACT_ABI,
    )

    print("[+] Retrieving bytes from contract ...")
    data: bytes = contract.functions.getName().call()

    hex_list = ",".join(f"0x{b:02x}" for b in data)
    print(f"[+] Bytes as hex: {hex_list}")
    print(f"[+] Byte length: {len(data)}")

    with open("name.bin", "wb") as f:
        f.write(data)
    print("[+] Saved to name.bin")

if __name__ == "__main__":
    main()

Output: 

Since the contract’s bytecode is stored on-chain, anyone can read it, disassemble it and decompile it.  

Our contract, deployed at  the address 0xAE3BA9D7C1374234B29525AE1EA07EA93D30F5ED, can be accessed from etherscan.io

Assuming this, payloads can also be stored there and never be deleted.   

To simulate a malicious payload, we created an execution testing the procedure by retrieving Linux or a Windows command depending on the victim Operating System. 

The procedure would look like the following: 

The read function, called by the malware, uses an RPC method (eth_call) and doesn’t create a transaction.  

Simulate EtherHiding with Cymulate today 

EtherHiding demonstrates how adversaries are constantly evolving, leveraging new techniques and technologies to gain access, weaponize and maintain persistence over infected systems. Its decentralized approach opens new challenges and perspectives, shifting how we think about threat surfaces and defensive strategies.  

Mitigating Etherhiding demands stronger client-side protection and more broadly, deeper visibility into Web3 interactions. This technique serves as a reminder that innovation in decentralization must be matched with innovation in security. 

Cymulate customers can find the new attack simulation under the name “Run Hidden Payload Stored in Blockchain.”  

Discover how you can prepare your defenses against the latest threats. See the Cymulate platform in action and sign up for a demo today

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo