The post Hackers now hiding malware inside Ethereum smart contracts appeared on BitcoinEthereumNews.com. ReversingLabs research uncovered a malware campaign that used Ethereum smart contracts to conceal malicious software URLS. The findings revealed that the hackers used the npm packages colortoolv2 and mimelib2, which acted as downloaders.  Once the npm packages have been installed, they fetch second-stage malware from a command and control infrastructure (C2) by querying Ethereum smart contracts. ReversingLabs researcher Lucija Valentic described the attack as creative, noting that it has not been seen before. The attackers’ approach bypassed traditional scans that typically flag suspicious URLs inside package scripts.  Threat actors hide malware in plain sight  Ethereum smart contracts are public programs that automate blockchain functions. In this case, they enabled hackers to hide malicious code in plain sight. The malicious payloads were hidden with a simple index.js file, which, when executed, reached out to the blockchain to retrieve the command and control (C2) server details. According to ReversingLabs’ research, downloader packages are not standard on npm, and blockchain hosting marked a new stage in evasion tactics. The discovery prompted researchers to scan widely across GitHub, where they discovered that the npm packages were embedded beneath repositories posing as cryptocurrency bots. The bots were disguised as Solana-trading-bot-v2, Hyperliquid-trading-bot-v2, and many more. The repositories were disguised as professional tools, attracting multiple commits, containers, and stars, but in reality, they were just fabricated.  According to the research, accounts that performed commits or forked the repositories were created in July and did not show any coding activity. Most of the accounts had a README file embedded in their repositories. It was uncovered that the commit counts were artificially generated via an automated process to inflate coding activity. For instance, most commits logged were just license file changes rather than meaningful updates.   Pasttimerles, a handle used by one maintainer, was notably used to share many commits.… The post Hackers now hiding malware inside Ethereum smart contracts appeared on BitcoinEthereumNews.com. ReversingLabs research uncovered a malware campaign that used Ethereum smart contracts to conceal malicious software URLS. The findings revealed that the hackers used the npm packages colortoolv2 and mimelib2, which acted as downloaders.  Once the npm packages have been installed, they fetch second-stage malware from a command and control infrastructure (C2) by querying Ethereum smart contracts. ReversingLabs researcher Lucija Valentic described the attack as creative, noting that it has not been seen before. The attackers’ approach bypassed traditional scans that typically flag suspicious URLs inside package scripts.  Threat actors hide malware in plain sight  Ethereum smart contracts are public programs that automate blockchain functions. In this case, they enabled hackers to hide malicious code in plain sight. The malicious payloads were hidden with a simple index.js file, which, when executed, reached out to the blockchain to retrieve the command and control (C2) server details. According to ReversingLabs’ research, downloader packages are not standard on npm, and blockchain hosting marked a new stage in evasion tactics. The discovery prompted researchers to scan widely across GitHub, where they discovered that the npm packages were embedded beneath repositories posing as cryptocurrency bots. The bots were disguised as Solana-trading-bot-v2, Hyperliquid-trading-bot-v2, and many more. The repositories were disguised as professional tools, attracting multiple commits, containers, and stars, but in reality, they were just fabricated.  According to the research, accounts that performed commits or forked the repositories were created in July and did not show any coding activity. Most of the accounts had a README file embedded in their repositories. It was uncovered that the commit counts were artificially generated via an automated process to inflate coding activity. For instance, most commits logged were just license file changes rather than meaningful updates.   Pasttimerles, a handle used by one maintainer, was notably used to share many commits.…

Hackers now hiding malware inside Ethereum smart contracts

2025/09/04 19:33

ReversingLabs research uncovered a malware campaign that used Ethereum smart contracts to conceal malicious software URLS. The findings revealed that the hackers used the npm packages colortoolv2 and mimelib2, which acted as downloaders. 

Once the npm packages have been installed, they fetch second-stage malware from a command and control infrastructure (C2) by querying Ethereum smart contracts.

ReversingLabs researcher Lucija Valentic described the attack as creative, noting that it has not been seen before. The attackers’ approach bypassed traditional scans that typically flag suspicious URLs inside package scripts. 

Threat actors hide malware in plain sight 

Ethereum smart contracts are public programs that automate blockchain functions. In this case, they enabled hackers to hide malicious code in plain sight. The malicious payloads were hidden with a simple index.js file, which, when executed, reached out to the blockchain to retrieve the command and control (C2) server details.

According to ReversingLabs’ research, downloader packages are not standard on npm, and blockchain hosting marked a new stage in evasion tactics.

The discovery prompted researchers to scan widely across GitHub, where they discovered that the npm packages were embedded beneath repositories posing as cryptocurrency bots. The bots were disguised as Solana-trading-bot-v2, Hyperliquid-trading-bot-v2, and many more. The repositories were disguised as professional tools, attracting multiple commits, containers, and stars, but in reality, they were just fabricated. 

According to the research, accounts that performed commits or forked the repositories were created in July and did not show any coding activity. Most of the accounts had a README file embedded in their repositories. It was uncovered that the commit counts were artificially generated via an automated process to inflate coding activity. For instance, most commits logged were just license file changes rather than meaningful updates.  

Pasttimerles, a handle used by one maintainer, was notably used to share many commits. Slunfuedrac, another handle, was tied to the inclusion of the malicious npm packages into the project files.

Once detected, the hackers kept switching dependencies to different accounts. After colortoosv2 was detected, they switched to mimelibv2 and subsequently towards mw3ha31q and cnaovalles, which contributed to the commit inflation and placement of malicious dependencies, respectively. 

ReversingLabs’ research linked the activity to Stargazer’s Ghost Network, a coordinated system of accounts that boosts the credibility of malicious repositories. The attack targeted developers who seek open-source cryptocurrency tools and might mistake inflated GitHub statistics for legitimate accounts.

Ethereum blockchain malware embedding marks a new phase in threat detection

The uncovered attack follows a series of attacks targeting the blockchain ecosystem. In March 2025, ResearchLabs uncovered other malicious npm packages that patched legitimate Ethers packages with code that enabled reverse shells. Ether-provider2 and ethers-providerZ npm packages containing malicious code that enabled reverse shells were uncovered. 

Several earlier cases, including the compromise of PyPI’s ultralytics package in December 2024, were also revealed for delivering cryptocurrency mining malware. Other incidents included trusted platforms like Google Drive and GitHub Gist being used to mask malicious code via C2 servers.

According to the research, 23 crypto-related supply chain incidents were recorded in 2024, ranging from malware to credentials breaches. 

The latest discovery employs old tricks but introduces the Ethereum contracts approach as a new mechanism. Valentic, the Research Labs researcher, said the discovery highlights the fast evolution of detection evasion strategies by malicious actors trolling open-source projects and developers. 

The research highlighted the importance of verifying open-source libraries’ legitimacy before adoption. Valentic warned that developers must assess each library they are considering before including it in their development environment. She added that it was clear that indicators such as stars, commits, and the number of maintainers can be easily manipulated.    

Both identified npm packages, colortoolsv2 and mimelib2, have since been removed from npm and the associated GitHub accounts closed, but the activity has shed light on how the software threat ecosystem is evolving. 

Don’t just read crypto news. Understand it. Subscribe to our newsletter. It’s free.

Source: https://www.cryptopolitan.com/hackers-now-hiding-malware-ethereum-sm/

Market Opportunity
Hyperbot Logo
Hyperbot Price(BOT)
$0.003735
$0.003735$0.003735
-6.32%
USD
Hyperbot (BOT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

‘One Battle After Another’ Becomes One Of This Decade’s Best-Reviewed Movies

‘One Battle After Another’ Becomes One Of This Decade’s Best-Reviewed Movies

The post ‘One Battle After Another’ Becomes One Of This Decade’s Best-Reviewed Movies appeared on BitcoinEthereumNews.com. Topline Critics have hailed Paul Thomas Anderson’s “One Battle After Another,” starring Leonardo DiCaprio, as a “masterpiece,” indicating potential Academy Awards success as it boasts near-perfect scores on review aggregators Metacritic and Rotten Tomatoes based on early reviews. Leonardo DiCaprio stars in “One Battle After Another,” which opens in theaters next week. (Photo by Jeff Spicer/Getty Images for Warner Bros. Pictures) Getty Images for Warner Bros. Pictures Key Facts “One Battle After Another” boasts a nearly perfect 97 out of a possible 100 on Metacritic based on its first 31 reviews, making it the highest-rated movie of this decade on Metacritic’s best movies of all time list. The movie also has a 96% score on Rotten Tomatoes based on the first 56 reviews, with only two reviews considered “rotten,” or negative. The Associated Press hailed the movie as “an American masterpiece,” noting the movie touches on topical political themes and depicts a society where “gun violence, white power and immigrant deportations recur in an ongoing dance, both farcical and tragic.” The movie stars DiCaprio as an ex-revolutionary who reunites with former accomplices to rescue his 16-year-old daughter when she goes missing, and Anderson has said the movie was inspired by the 1990 novel, “Vineland.” Most critics have described the movie as an action thriller with notable chase scenes, which jumps in time from DiCaprio’s character’s early days with fictional revolutionary group, the French 75, to about 15 years later, when he is pursued by foe and military leader Captain Steven Lockjaw, played by Sean Penn. The Warner Bros.-produced film was made on a big budget, estimated to be between $130 million and $175 million, and co-stars Penn, Benicio del Toro, Regina Hall and Teyana Taylor. When Will ‘one Battle After Another’ Open In Theaters And Streaming? The move opens in…
Share
BitcoinEthereumNews2025/09/18 07:35
XRP Price Prediction: Can Ripple Rally Past $2 Before the End of 2025?

XRP Price Prediction: Can Ripple Rally Past $2 Before the End of 2025?

The post XRP Price Prediction: Can Ripple Rally Past $2 Before the End of 2025? appeared first on Coinpedia Fintech News The XRP price has come under enormous pressure
Share
CoinPedia2025/12/16 19:22
DMCC and Crypto.com Partner to Explore Blockchain Infrastructure for Physical Commodities

DMCC and Crypto.com Partner to Explore Blockchain Infrastructure for Physical Commodities

The Dubai Multi Commodities Centre and Crypto.com have announced a partnership to explore on-chain infrastructure for physical commodities including gold, energy, and agricultural products. The collaboration brings together one of the world's leading free trade zones with a global cryptocurrency exchange, signaling serious institutional interest in commodity tokenization.
Share
MEXC NEWS2025/12/16 20:46