Hackers Are Exploiting Ethereum Smart Contracts to Conceal Malware Payloads

Ethereum Smart Contracts Exploited to Hide Malware in NPM Packages

Ethereum has become a new avenue for software supply chain attacks, with attackers leveraging smart contracts to conceal malicious code.

Researchers at ReversingLabs discovered two NPM packages—colortoolsv2 and mimelib2—that appeared to be simple utilities but were actually designed to fetch hidden URLs from Ethereum’s blockchain. These URLs directed compromised systems to download second-stage malware, allowing the attack to bypass traditional security detection.

NPM, the largest package registry for Node.js, provides developers access to millions of code modules, making it a prime target for malicious actors. The malicious packages were uploaded in July and initially appeared benign, masking their true intent by embedding commands within smart contracts. This tactic disguised the malicious activity as legitimate blockchain traffic, complicating detection efforts.

“This is something we haven’t seen previously,” said Lucija Valentić, a researcher at ReversingLabs. “It highlights how attackers are rapidly evolving their evasion strategies, targeting open-source repositories and developers.”

The technique builds on older attack methods that used trusted services like GitHub Gists, Google Drive, and OneDrive to host malicious links. By incorporating Ethereum smart contracts, attackers added a crypto-specific twist to a familiar supply chain tactic.

ReversingLabs noted that the malicious packages were tied to fake GitHub repositories posing as cryptocurrency trading bots, padded with fabricated commits, bogus user accounts, and inflated star counts to appear legitimate. Developers who installed the packages risked inadvertently importing malware.

Open-source supply chain risks are not new. In 2024, researchers identified over 20 malicious campaigns targeting developers through platforms like NPM and PyPI, often aiming to steal wallet credentials or install crypto miners. The new Ethereum-based approach demonstrates how attackers are adapting to blend into blockchain ecosystems.

Key Takeaways for Developers:

  • Popular commits, active maintainers, and repository metrics can be faked.
  • Even seemingly innocuous packages may carry hidden payloads.
  • Vigilance is required when integrating open-source crypto tooling into projects.
  • Related Posts

    Binance expands its platform with a prediction market offering for millions of users.

    Binance has added a prediction markets feature to its Binance Wallet, enabling users to trade on real-world event outcomes directly within the app. The integration links Binance Wallet to Predict.fun,…

    Continue reading
    Bhutan has reportedly divested 70% of its Bitcoin over the past 18 months and may have paused or ended BTC mining.

    Bhutan is steadily exiting one of the most closely watched sovereign bitcoin strategies, continuing a measured reduction in its holdings. The kingdom’s reserves have declined from roughly 13,000 BTC in…

    Continue reading