The post Hackers Use Ethereum Smart Contracts To Hide Malware Attacks appeared on BitcoinEthereumNews.com. Threat actors have found a new way to deliver malicious software, commands, and links inside Ethereum smart contracts to evade security scans as attacks using code repositories evolve.  Cybersecurity researchers at digital asset compliance firm ReversingLabs have found new pieces of open-source malware discovered on the Node Package Manager (NPM) package repository, a large collection of JavaScript packages and libraries. The malware packages “employ a novel and creative technique for loading malware on compromised devices — smart contracts for the Ethereum blockchain,” ReversingLabs researcher Lucija Valentić said in a blog post on Wednesday. The two packages, “colortoolsv2” and “mimelib2,” published in July, “abused smart contracts to conceal malicious commands that installed downloader malware on compromised systems,” explained Valentić.  To avoid security scans, the packages functioned as simple downloaders and instead of directly hosting malicious links, they retrieved command and control server addresses from the smart contracts.  When installed, the packages would query the blockchain to fetch URLs for downloading second-stage malware, which carries the payload or action, making detection more difficult since blockchain traffic appears legitimate. NPM packages ‘colortoolsv2’ and ‘mimelib2’ on GitHub. Source: ReversingLabs A new attack vector  Malware targeting Ethereum smart contracts is not new; it was used earlier this year by the North Korean-affiliated hacking collective the Lazarus Group. “What is new and different is the use of Ethereum smart contracts to host the URLs where malicious commands are located, downloading the second-stage malware,” said Valentić, who added:  “That’s something we haven’t seen previously, and it highlights the fast evolution of detection evasion strategies by malicious actors who are trolling open source repositories and developers.” An elaborate crypto deception campaign The malware packages were part of a larger, elaborate social engineering and deception campaign primarily operating through GitHub.  Threat actors created fake cryptocurrency trading bot repositories designed… The post Hackers Use Ethereum Smart Contracts To Hide Malware Attacks appeared on BitcoinEthereumNews.com. Threat actors have found a new way to deliver malicious software, commands, and links inside Ethereum smart contracts to evade security scans as attacks using code repositories evolve.  Cybersecurity researchers at digital asset compliance firm ReversingLabs have found new pieces of open-source malware discovered on the Node Package Manager (NPM) package repository, a large collection of JavaScript packages and libraries. The malware packages “employ a novel and creative technique for loading malware on compromised devices — smart contracts for the Ethereum blockchain,” ReversingLabs researcher Lucija Valentić said in a blog post on Wednesday. The two packages, “colortoolsv2” and “mimelib2,” published in July, “abused smart contracts to conceal malicious commands that installed downloader malware on compromised systems,” explained Valentić.  To avoid security scans, the packages functioned as simple downloaders and instead of directly hosting malicious links, they retrieved command and control server addresses from the smart contracts.  When installed, the packages would query the blockchain to fetch URLs for downloading second-stage malware, which carries the payload or action, making detection more difficult since blockchain traffic appears legitimate. NPM packages ‘colortoolsv2’ and ‘mimelib2’ on GitHub. Source: ReversingLabs A new attack vector  Malware targeting Ethereum smart contracts is not new; it was used earlier this year by the North Korean-affiliated hacking collective the Lazarus Group. “What is new and different is the use of Ethereum smart contracts to host the URLs where malicious commands are located, downloading the second-stage malware,” said Valentić, who added:  “That’s something we haven’t seen previously, and it highlights the fast evolution of detection evasion strategies by malicious actors who are trolling open source repositories and developers.” An elaborate crypto deception campaign The malware packages were part of a larger, elaborate social engineering and deception campaign primarily operating through GitHub.  Threat actors created fake cryptocurrency trading bot repositories designed…

Hackers Use Ethereum Smart Contracts To Hide Malware Attacks

Threat actors have found a new way to deliver malicious software, commands, and links inside Ethereum smart contracts to evade security scans as attacks using code repositories evolve. 

Cybersecurity researchers at digital asset compliance firm ReversingLabs have found new pieces of open-source malware discovered on the Node Package Manager (NPM) package repository, a large collection of JavaScript packages and libraries.

The malware packages “employ a novel and creative technique for loading malware on compromised devices — smart contracts for the Ethereum blockchain,” ReversingLabs researcher Lucija Valentić said in a blog post on Wednesday.

The two packages, “colortoolsv2” and “mimelib2,” published in July, “abused smart contracts to conceal malicious commands that installed downloader malware on compromised systems,” explained Valentić. 

To avoid security scans, the packages functioned as simple downloaders and instead of directly hosting malicious links, they retrieved command and control server addresses from the smart contracts. 

When installed, the packages would query the blockchain to fetch URLs for downloading second-stage malware, which carries the payload or action, making detection more difficult since blockchain traffic appears legitimate.

NPM packages ‘colortoolsv2’ and ‘mimelib2’ on GitHub. Source: ReversingLabs

A new attack vector 

Malware targeting Ethereum smart contracts is not new; it was used earlier this year by the North Korean-affiliated hacking collective the Lazarus Group.

“What is new and different is the use of Ethereum smart contracts to host the URLs where malicious commands are located, downloading the second-stage malware,” said Valentić, who added: 

An elaborate crypto deception campaign

The malware packages were part of a larger, elaborate social engineering and deception campaign primarily operating through GitHub. 

Threat actors created fake cryptocurrency trading bot repositories designed to look highly trustworthy through fabricated commits, fake user accounts created specifically to watch repositories, multiple maintainer accounts to simulate active development, and professional-looking project descriptions and documentation.

Related: Crypto users warned as ads push malware-laden crypto apps

Threat actors are evolving 

In 2024, security researchers documented 23 crypto-related malicious campaigns on open-source repositories, but this latest attack vector “shows that attacks on repositories are evolving,” combining blockchain technology with elaborate social engineering to bypass traditional detection methods, Valentić concluded. 

These attacks are not only executed on Ethereum. In April, a fake GitHub repository posing as a Solana trading bot was used to distribute obscured malware that stole crypto wallet credentials. Hackers have also targeted “Bitcoinlib,” an open-source Python library designed to make Bitcoin development easier.

Magazine: Bitcoin to see ‘one more big thrust’ to $150K, ETH pressure builds: Trade Secrets

Source: https://cointelegraph.com/news/new-malware-discovered-targeting-ethereum-smart-contracts-devs?utm_source=rss_feed&utm_medium=feed%3Fsid%3D4f549ebc9188c326%26_dc%3D1756996162029%26nc%3D1756996162029&utm_campaign=rss_partner_inbound

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.006356
$0.006356$0.006356
-3.76%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Italy passes law on AI outlining privacy and child access

Italy passes law on AI outlining privacy and child access

The post Italy passes law on AI outlining privacy and child access appeared on BitcoinEthereumNews.com. Italy has formally passed a sweeping new law to regulate artificial intelligence, becoming the first member of the European Union to roll out comprehensive legislation in step with the bloc’s landmark AI Act. The Italian Senate granted final approval after a year of debate, concluding what Prime Minister Giorgia Meloni’s government described as a decisive step in shaping how new technologies are deployed across the country. Italy sets tough penalties for offenders The legislation, ministers argue, lays out the boundaries for human-centric, transparent, and safe use of AI while balancing the need to foster innovation, cybersecurity, and economic growth. The law casts its net widely, and it stretches into healthcare, schools, the justice system, workplaces, sport, and the public sector. AI access for children under 14 has also been tightened, and it now requires parental consent. “This law brings innovation back within the perimeter of the public interest, steering AI toward growth, rights and full protection of citizens.” Alessio Butti, the undersecretary for digital transformation. Lawmakers also opted for a hard line on abuses. A new offence has been added to the criminal code covering the unlawful spread of AI-generated or manipulated content, such as deepfakes. Anyone found guilty faces between one and five years in prison if their actions cause harm. Using AI to commit fraud, identity theft, market manipulation, or money laundering will now be treated as an aggravating circumstance, raising potential sentences by a third. Judges remain the sole authority in legal rulings, though courts are empowered to demand rapid takedowns of illicit material. Government agencies to oversee its implementation Responsibility for enforcing the regime lies with the Agency for Digital Italy and the National Cybersecurity Agency, though existing financial watchdogs such as the Bank of Italy and Consob retain powers in their own spheres. The Department…
Share
BitcoinEthereumNews2025/09/18 06:05
Strategic Silence As Beijing Media Blames US, Israel For Dangerous Escalation

Strategic Silence As Beijing Media Blames US, Israel For Dangerous Escalation

The post Strategic Silence As Beijing Media Blames US, Israel For Dangerous Escalation appeared on BitcoinEthereumNews.com. China Iran Tensions: Strategic Silence
Share
BitcoinEthereumNews2026/02/28 21:31
Trump sabotages emerging peace deal with military escalation

Trump sabotages emerging peace deal with military escalation

President Donald Trump launched strikes on Iran early Saturday morning, claiming that talks over a nuclear agreement had broken down. Speaking after midnight, Trump
Share
Alternet2026/02/28 20:52