Hackers Use Ethereum Smart Contracts to Hide Malware and Bypass Security Detection
According to ChainCatcher, ReversingLabs researchers have disclosed that the NPM packages "colortoolsv 2" and "mimelib 2," released in July, use Ethereum smart contracts to hide malicious URLs and evade security scans. These packages function as downloaders, retrieving command and control server addresses from smart contracts and then downloading second-stage malware, making blockchain traffic appear legitimate and thus increasing detection difficulty.
The research points out that this is the first time Ethereum smart contracts have been found hosting malicious command URLs, indicating that attackers’ strategies to evade detection in open-source repositories are rapidly evolving.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
The total on-chain holdings of US spot Bitcoin ETFs have surpassed 1.32 million BTC.
Yesterday, the net inflow of US spot Ethereum ETFs was $76.6 million.
Analyst: Bitcoin has bottomed out in the short term, a rebound towards $100,000 may occur

BlackRock IBIT holdings drop to 777,700 BTC
