top of page

DPRK Read Our Math: How North Korea Inverted Blockchain Vulnerability

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 2
  • 4 min read

The Setup


In October 2025, we published "The Math on Blockchain Security Theater: Quorum Attacks for $0-$50."

The thesis was simple: enterprise blockchain security is theater. Oracle Cloud's Always Free Tier gives you 4 ARM cores per account. Spin up 13 accounts with different emails, and you control 52 validator nodes. That's enough to take over quorum on most enterprise deployments.

Cost to attack "secure enterprise blockchain": $0.

We showed the receipts. Hyperledger Fabric, Quorum, any permissioned chain - all vulnerable to a script kiddie with stolen credit cards and patience.

The piece ended with a table:

Chain Type

Attack Cost

Ethereum (public)

$27 billion

Hyperledger Fabric

$0-$50/month

Quorum (JPMorgan)

$1-$3/month

Ethereum was safe because Proof of Stake requires controlling 51% of staked ETH - roughly $27 billion at current prices. Economic security, not cryptographic theater.

We published. We moved on.

The Payoff


December 28, 2025. Sunday morning threat sweep. Coffee in hand.

DPRK surfaces with new toys. Two days after CVE-2025-55182 (React2Shell) dropped, North Korean actors had already weaponized it. But the exploit wasn't interesting.

The command and control was.

EtherHiding: They built a C2 system that stores its address in an Ethereum smart contract.

  1. Queries 9 different Ethereum RPC endpoints in parallel

  2. Uses consensus voting to determine the real C2 URL

  3. Retrieves the address from the blockchain

  4. Connects to the attacker's server

They read our math. And they inverted it.

The Inversion


  • Enterprise blockchain (permissioned) = vulnerable to $0 attack

  • Public blockchain (Ethereum) = economically secure ($27B to attack)

  • The weakness is centralized validator trust

  • Don't attack the chain

  • Don't try to control validators

  • Freeload the read layer

The RPC endpoints (Infura, Alchemy, Ankr, etc.) provide free oracle compute. You can read from the blockchain without paying gas. Query as many endpoints as you want. They're designed for high availability.

DPRK turned our vulnerability analysis into a feature set:

Our Finding

Their Application

Public chain economically secure

Use it as immutable bulletin board

Can't 51% attack Ethereum

Don't need to - just store data

RPC endpoints are free

Free C2 lookup infrastructure

Consensus voting resists poisoning

Query 9 endpoints, majority wins

They didn't attack the blockchain. They used it as free, untakeable infrastructure.

Why "Untakeable" Matters


  1. FBI identifies malicious server

  2. Subpoena to hosting provider

  3. Server seized or null-routed

  4. Malware orphaned

  1. FBI identifies smart contract address

  2. Call... who exactly?

  3. Ethereum Foundation? They don't control the chain.

  4. Infura? There are 8 other RPC providers.

  5. Vitalik Buterin? Smart contracts are immutable by design.

The C2 address lives on-chain forever. Update it anytime by calling the contract. No re-infection needed. Victims auto-discover new C2 on next beacon.

Researchers can't poison the pool - consensus voting across 9 endpoints filters out injected responses.

It's domain-native persistence. DPRK steals billions in crypto. They live in this ecosystem. Hiding C2 infrastructure on Ethereum is like a bank robber hiding getaway car keys in the vault.

The Free Oracle Compute Angle


From our October piece:


Oracle Cloud ARM - Always Free Tier - 4 ARM cores (Ampere A1) - 24 GB RAM - 10 TB outbound bandwidth/month - Forever free


We meant this as an attack vector for quorum consensus.

DPRK read it as: "Free compute exists. What else is free?"

Answer: Ethereum RPC queries.

  • Infura: 100K requests/day free

  • Alchemy: 300M compute units/month free

  • Ankr: Public endpoints, no auth required

  • QuickNode: 10M API credits free

That's unlimited C2 lookups. Forever. No stolen credit cards needed.

The blockchain itself becomes the oracle. The RPC providers become free compute for reading it. And nobody can turn it off because decentralization is the feature, not the bug.

IOCs (Block These)


EtherRAT Staging: `` 193.24.123.68 ``

React2Shell C2 (used in same campaign): `` 193.34.213.150 154.89.152.240 107.174.123.91 38.165.44.205 45.76.155.14 216.238.68.169 78.153.140.16 80.64.16.241 2.56.176.35 ``

Detection Opportunity:

Hunt for Ethereum RPC traffic from your web servers.

  • eth_call

  • eth_getStorageAt

  • Any Infura/Alchemy/Ankr endpoint

If it is? You're already compromised.

The Uncomfortable Truth


We published vulnerability research. Nation-state actors read it and found an application we didn't consider.

This isn't a criticism of our work. The quorum attack math is still valid - enterprise blockchain remains security theater. The point is that adversaries are reading the same research we are.

When we write "here's how to attack X for $0," someone in Pyongyang (or Beijing, or Moscow) is taking notes. They're not just consuming threat intel. They're consuming vulnerability research and finding novel applications.

DPRK didn't discover that Ethereum RPC is free. They read our analysis of free cloud compute, extrapolated to free blockchain compute, and built C2 infrastructure on it.

They're doing R&D. On our research.

What Comes Next


EtherHiding is version 1.0. Expect:

  • Multi-chain resilience: Store C2 on Ethereum, Polygon, Arbitrum, Base simultaneously

  • Smart contract obfuscation: Hide C2 address in complex contract state

  • Cross-chain consensus: Query multiple chains, not just multiple endpoints

  • L2 migration: Cheaper writes, same read availability

  • ENS integration: Human-readable C2 names that resolve on-chain

The substrate shifted. Once you realize the blockchain is a free, immutable, globally-distributed bulletin board with unlimited read capacity, the applications multiply.

The Meta-Lesson


Cui bono from our research?

  1. Defenders who read it and hardened their blockchain deployments

  2. DPRK, who read it and built untakeable C2 infrastructure

We can't control who reads public research. We can only make sure defenders get there first.

That's why we publish IOCs same-day. That's why the STIX feed is free. That's why this blog post exists before DPRK's next campaign.

The race isn't to discover vulnerabilities. It's to get the defense deployed before the offense catches up.

Today, we're publishing the detection opportunity (Ethereum RPC traffic from web servers) before it becomes the next big campaign.

Tomorrow, we'll see if we were fast enough.

Get Protected


OTX Pulse: DPRK EtherRAT

STIX 2.1 Feed: ``bash curl https://analytics.dugganusa.com/api/v1/stix-feed ``

Free. Machine-readable. No NDA required.



They read our math. They inverted it. Now you know too.

Analysis by DugganUSA Threat Intelligence - January 2, 2026

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page