Reports have disclosed that hackers are taking advantage of Ethereum smart contracts to conceal malware commands, creating a fresh challenge for cybersecurity teams. Related Reading: Bitcoin Payments Now Accepted By Top UAE Developer For Real Estate Researchers say the method lets attackers hide behind blockchain traffic that often looks legitimate, making detection far more difficult. […]Reports have disclosed that hackers are taking advantage of Ethereum smart contracts to conceal malware commands, creating a fresh challenge for cybersecurity teams. Related Reading: Bitcoin Payments Now Accepted By Top UAE Developer For Real Estate Researchers say the method lets attackers hide behind blockchain traffic that often looks legitimate, making detection far more difficult. […]

Ethereum Smart Contracts Become Latest Hiding Spot For Malware

2025/09/04 18:00
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Reports have disclosed that hackers are taking advantage of Ethereum smart contracts to conceal malware commands, creating a fresh challenge for cybersecurity teams.

Researchers say the method lets attackers hide behind blockchain traffic that often looks legitimate, making detection far more difficult.

New Attack Vector Surfaces

According to digital asset compliance firm ReversingLabs, two packages uploaded to the Node Package Manager (NPM) repository in July were found to use this method.

The packages, “colortoolsv2” and “mimelib2,” appeared harmless on the surface but contained hidden functions that pulled instructions from Ethereum smart contracts.

Instead of directly hosting malicious links, they acted as downloaders, retrieving addresses for command-and-control servers before installing second-stage malware.

Lucija Valentić, a researcher at ReversingLabs, explained that what stood out was the hosting of malicious URLs on Ethereum contracts.

“That’s something we haven’t seen previously,” Valentić said, adding that it marks a quick shift in the way attackers are dodging security scans.

Fake Trading Bots And Social Tricks

The incident is not an isolated attempt. Researchers found that the packages were part of a much wider deception campaign, mainly carried out through GitHub.

Hackers had built fake cryptocurrency trading bot repositories, filling them with fabricated commits, multiple fake maintainer accounts, and polished documentation to lure developers. These projects were designed to look trustworthy, hiding the real purpose of delivering malware.

In 2024 alone, 23 crypto-related malicious campaigns were documented across open-source repositories. Security analysts believe this latest tactic, combining blockchain commands with social engineering, raises the bar for anyone trying to defend against such attacks.

Past Cases Targeting Crypto Projects

Ethereum is not the only blockchain pulled into these schemes. Earlier this year, the North Korean-linked Lazarus Group was tied to malware that also touched Ethereum contracts, though the approach then was different.

In April, attackers spread a fake GitHub repository posing as a Solana trading bot, using it to plant malware that stole wallet credentials.

Another case involved “Bitcoinlib,” a Python library meant for Bitcoin development, which hackers targeted for similar purposes.

While the specific methods shift, the trend is clear: crypto-related developer tools and open-source code repositories are being used as traps. The use of blockchain features such as smart contracts is only making the problem harder to detect.

Valentić summed it up by saying that attackers are constantly searching for fresh ways to bypass defenses. Hosting malicious commands on Ethereum contracts, she said, shows how far some are willing to go to stay one step ahead.

Featured image from Meta, chart from TradingView

시장 기회
RealLink 로고
RealLink 가격(REAL)
$0.06547
$0.06547$0.06547
-0.51%
USD
RealLink (REAL) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!