시가 총액
24시간 볼륨
10071
암호화폐
58.26%
Bitcoin 공유

Ethereum Smart Contracts Become Latest Hiding Spot For Malware

Ethereum Smart Contracts Become Latest Hiding Spot For Malware


Bitcoinist
2025-09-04 10:00:12

Reports have disclosed that hackers are taking advantage of Ethereum smart contracts to conceal malware commands, creating a fresh challenge for cybersecurity teams. Researchers say the method lets attackers hide behind blockchain traffic that often looks legitimate, making detection far more difficult. New Attack Vector Surfaces According to digital asset compliance firm ReversingLabs, two packages uploaded to the Node Package Manager (NPM) repository in July were found to use this method. The packages, “ colortoolsv2 ” and “ mimelib2 ,” appeared harmless on the surface but contained hidden functions that pulled instructions from Ethereum smart contracts . Instead of directly hosting malicious links, they acted as downloaders, retrieving addresses for command-and-control servers before installing second-stage malware. Lucija Valentić, a researcher at ReversingLabs, explained that what stood out was the hosting of malicious URLs on Ethereum contracts. “That’s something we haven’t seen previously,” Valentić said, adding that it marks a quick shift in the way attackers are dodging security scans. Fake Trading Bots And Social Tricks The incident is not an isolated attempt. Researchers found that the packages were part of a much wider deception campaign, mainly carried out through GitHub. Hackers had built fake cryptocurrency trading bot repositories, filling them with fabricated commits, multiple fake maintainer accounts, and polished documentation to lure developers. These projects were designed to look trustworthy, hiding the real purpose of delivering malware. In 2024 alone, 23 crypto-related malicious campaigns were documented across open-source repositories. Security analysts believe this latest tactic, combining blockchain commands with social engineering, raises the bar for anyone trying to defend against such attacks. Past Cases Targeting Crypto Projects Ethereum is not the only blockchain pulled into these schemes. Earlier this year, the North Korean-linked Lazarus Group was tied to malware that also touched Ethereum contracts, though the approach then was different. In April, attackers spread a fake GitHub repository posing as a Solana trading bot, using it to plant malware that stole wallet credentials. Another case involved “Bitcoinlib,” a Python library meant for Bitcoin development, which hackers targeted for similar purposes. While the specific methods shift, the trend is clear: crypto-related developer tools and open-source code repositories are being used as traps. The use of blockchain features such as smart contracts is only making the problem harder to detect. Valentić summed it up by saying that attackers are constantly searching for fresh ways to bypass defenses. Hosting malicious commands on Ethereum contracts, she said, shows how far some are willing to go to stay one step ahead. Featured image from Meta, chart from TradingView


면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.