✅ Hackers have discovered a new technique to hide malware inside Ethereum smart contracts, bypassing traditional security scans.



According to ReversingLabs, two malicious NPM packages, colortoolsv2 and mimelib2 (published in July), abused smart contracts to conceal URLs used for downloading malware. Once installed, the packages queried the blockchain to fetch C2 server addresses, delivering second-stage malware. Since blockchain traffic looks legitimate, this method makes detection much harder.

🔎 This was part of a sophisticated GitHub deception campaign: fake crypto trading bot repos, fabricated commits, multiple maintainer accounts, and polished documentation to build trust.

👉 The trend shows hackers are rapidly combining blockchain + social engineering to evade detection.
#Ethereum Cybersecurity #Malware
IN-1,05%
STAGE-1,71%
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)