PANews reported on September 4th that according to research by digital asset compliance firm ReversingLabs, hackers have recently exploited Ethereum smart contracts to store malicious instructions and spread new malware through the Node Package Manager (NPM) repository. The "colortoolsv2" and "mimelib2" packages, released in July, query blockchain smart contracts to obtain the download address for the second-stage malware, evading traditional security scans. The attack was part of a larger social engineering scam. Hackers created a fake cryptocurrency trading bot repository on GitHub and projected a trustworthy image by fabricating commit records, maintaining accounts, and providing professional documentation. Researchers noted that while the North Korean hacker group Lazarus has used similar techniques before, this is the first time they've used smart contracts to host malicious URLs, demonstrating the continued evolution of their attack strategies.PANews reported on September 4th that according to research by digital asset compliance firm ReversingLabs, hackers have recently exploited Ethereum smart contracts to store malicious instructions and spread new malware through the Node Package Manager (NPM) repository. The "colortoolsv2" and "mimelib2" packages, released in July, query blockchain smart contracts to obtain the download address for the second-stage malware, evading traditional security scans. The attack was part of a larger social engineering scam. Hackers created a fake cryptocurrency trading bot repository on GitHub and projected a trustworthy image by fabricating commit records, maintaining accounts, and providing professional documentation. Researchers noted that while the North Korean hacker group Lazarus has used similar techniques before, this is the first time they've used smart contracts to host malicious URLs, demonstrating the continued evolution of their attack strategies.

Hackers Found New Way to Hide Malware in Ethereum Smart Contracts: Research

2025/09/04 12:01
1 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo crypto.news@mexc.com.

PANews reported on September 4th that according to research by digital asset compliance firm ReversingLabs, hackers have recently exploited Ethereum smart contracts to store malicious instructions and spread new malware through the Node Package Manager (NPM) repository. The "colortoolsv2" and "mimelib2" packages, released in July, query blockchain smart contracts to obtain the download address for the second-stage malware, evading traditional security scans.

The attack was part of a larger social engineering scam. Hackers created a fake cryptocurrency trading bot repository on GitHub and projected a trustworthy image by fabricating commit records, maintaining accounts, and providing professional documentation. Researchers noted that while the North Korean hacker group Lazarus has used similar techniques before, this is the first time they've used smart contracts to host malicious URLs, demonstrating the continued evolution of their attack strategies.

Opportunità di mercato
Logo NODE
Valore NODE (NODE)
$0.01206
$0.01206$0.01206
-0.24%
USD
Grafico dei prezzi in tempo reale di NODE (NODE)
Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta crypto.news@mexc.com per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!