Bad actors have started using Ethereum smart contracts to deploy malicious software and code, and are therefore able to bypass traditional security scans using this novel technique. Researchers at ReversingLabs have flagged a new open-source malware that has been deployed…Bad actors have started using Ethereum smart contracts to deploy malicious software and code, and are therefore able to bypass traditional security scans using this novel technique. Researchers at ReversingLabs have flagged a new open-source malware that has been deployed…

Bad actors are using Ethereum smart contracts to deploy malware: ReversingLabs

2025/09/04 16:22
3 min read

Bad actors have started using Ethereum smart contracts to deploy malicious software and code, and are therefore able to bypass traditional security scans using this novel technique.

Summary
  • The npm packages use Ethereum smart contracts to hide malicious payloads.
  • Researchers believe it is part of a larger campaign that primarily operates through GitHub.

Researchers at ReversingLabs have flagged a new open-source malware that has been deployed across the Node Package Manager (NPM) repository, where it uses obfuscated scripts and smart contracts to fetch command-and-control server URLs that deliver malicious payloads onto compromised systems.

The NPM package repository is a widely used platform for distributing JavaScript libraries and tools. Over the past few years, it has increasingly become a target for software supply chain attacks as hackers are able to trick developers into integrating malicious dependencies into their projects via this method.

According to ReversingLabs, a new strain of open-source malware was found hidden in two npm packages named colortoolsv2 and mimelib2. The packages were found to be using Ethereum smart contracts to remotely load malicious commands and install downloader malware on infected systems.

Both the packages first surfaced in July and function as simple downloaders at first glance. However, instead of directly hosting malicious links, those packages would query the blockchain to fetch URLs when installed.

Subsequently, the retrieved URLs would connect to attacker-controlled command-and-control servers, which then delivered a second-stage payload. Typically, these malicious payloads are designed to exfiltrate sensitive data, install remote access tools, or serve as entry points for a larger attack.

Researchers at ReversingLabs claimed the packages were published as part of a broader campaign targeting open-source ecosystems like npm and GitHub, where attackers relied on social engineering and deceptive project setups to target developers into integrating the malicious code into real-world applications. 

Infrastructure-level attacks are evolving

Threat actors have long employed infrastructure-level tactics that are harder to detect. A separate report from ReversingLabs published earlier this year found a trojanized npm package that scanned systems for installed wallets like Atomic and Exodus and silently redirected transactions to attacker-controlled addresses.

Meanwhile, the infamous North Korean hacking group Lazarus was observed deploying its own malicious npm packages earlier this year.

Another incident flagged by security firm Slowmist in 2024 revealed a scam using a malicious Ethereum remote procedure call (RPC) function to deceive users of the imToken wallet.

However, unlike the previous attack vectors, the new campaign discovered by ReversingLabs separates itself by using “ethereum smart contracts to host the URLs where malicious commands are located,” the report noted. 

ReversingLabs urged developers to exercise caution when interacting with npm libraries and third-party packages.

Market Opportunity
Smart Blockchain Logo
Smart Blockchain Price(SMART)
$0.004421
$0.004421$0.004421
-2.19%
USD
Smart Blockchain (SMART) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Italy passes law on AI outlining privacy and child access

Italy passes law on AI outlining privacy and child access

The post Italy passes law on AI outlining privacy and child access appeared on BitcoinEthereumNews.com. Italy has formally passed a sweeping new law to regulate artificial intelligence, becoming the first member of the European Union to roll out comprehensive legislation in step with the bloc’s landmark AI Act. The Italian Senate granted final approval after a year of debate, concluding what Prime Minister Giorgia Meloni’s government described as a decisive step in shaping how new technologies are deployed across the country. Italy sets tough penalties for offenders The legislation, ministers argue, lays out the boundaries for human-centric, transparent, and safe use of AI while balancing the need to foster innovation, cybersecurity, and economic growth. The law casts its net widely, and it stretches into healthcare, schools, the justice system, workplaces, sport, and the public sector. AI access for children under 14 has also been tightened, and it now requires parental consent. “This law brings innovation back within the perimeter of the public interest, steering AI toward growth, rights and full protection of citizens.” Alessio Butti, the undersecretary for digital transformation. Lawmakers also opted for a hard line on abuses. A new offence has been added to the criminal code covering the unlawful spread of AI-generated or manipulated content, such as deepfakes. Anyone found guilty faces between one and five years in prison if their actions cause harm. Using AI to commit fraud, identity theft, market manipulation, or money laundering will now be treated as an aggravating circumstance, raising potential sentences by a third. Judges remain the sole authority in legal rulings, though courts are empowered to demand rapid takedowns of illicit material. Government agencies to oversee its implementation Responsibility for enforcing the regime lies with the Agency for Digital Italy and the National Cybersecurity Agency, though existing financial watchdogs such as the Bank of Italy and Consob retain powers in their own spheres. The Department…
Share
BitcoinEthereumNews2025/09/18 06:05
Strategic Silence As Beijing Media Blames US, Israel For Dangerous Escalation

Strategic Silence As Beijing Media Blames US, Israel For Dangerous Escalation

The post Strategic Silence As Beijing Media Blames US, Israel For Dangerous Escalation appeared on BitcoinEthereumNews.com. China Iran Tensions: Strategic Silence
Share
BitcoinEthereumNews2026/02/28 21:31
Trump sabotages emerging peace deal with military escalation

Trump sabotages emerging peace deal with military escalation

President Donald Trump launched strikes on Iran early Saturday morning, claiming that talks over a nuclear agreement had broken down. Speaking after midnight, Trump
Share
Alternet2026/02/28 20:52