시가 총액
24시간 볼륨
10071
암호화폐
58.26%
Bitcoin 공유

Hackers Exploit Ethereum to Inject Malware in Popular Coding Libraries

Hackers Exploit Ethereum to Inject Malware in Popular Coding Libraries


cryptonews
2025-09-04 12:39:13

Hackers are now exploiting vulnerabilities in widely-used NPM coding libraries to inject malware into Ethereum smart contracts, according to cybersecurity research by blockchain compliance firm Reversing Labs(RL). In a September 3 blog post detailing the discovery, researcher Lucija Valentić revealed that threat actors bypass security scans by exploiting new open-source malware present in the Node Package Manager (NPM) package repository, which contains extensive JavaScript packages and libraries. The most destructive malware discovered was “ colortoolsv2 ” and “ mimelib2 “, both published in July, which were found to abuse smart contracts to conceal malicious commands that install downloader malware on infected systems. Source: ReversingLabs How Ethereum Smart Contracts Turn Into Malware Command Centers These packages are part of broader open-source libraries affecting both NPM and GitHub, where malicious supply chain actors use advanced social engineering and deception tactics to trick developers into incorporating harmful code into their projects. According to ReversingLabs , 2025 has witnessed a diverse range of malicious campaigns targeting NPM, the leading online repository for JavaScript packages. In March, RL documented the discovery of NPM packages ethers-provider2 and ethers-providerz Since discovering the ethers campaign, researchers have detected numerous additional infostealers, downloaders, and droppers found on NPM. At the beginning of July, RL researcher Karlo Zanki discovered and reported a new NPM campaign involving a basic package that deployed blockchain in a novel way to deliver a malicious second stage. RL threat researchers detected a malicious #npm package abusing #blockchain for malicious command hosting: https://t.co/Hc0QjaH3So pic.twitter.com/uQ3xXAIEkZ — ReversingLabs (@ReversingLabs) July 11, 2025 The exact package colortoolsv2 is being used to infiltrate Ethereum smart contracts. According to RL researchers, the malware is a basic NPM package containing just two files. The major file is a script named index.js, which contains a hidden malicious payload. Once installed in a project, the script would run to fetch blockchain data and execute a harmful command by loading the URL for a command and control (C2) server that would then download second-stage malware to the requesting system. Although “downloader” malware is a common method hackers use in NPM repositories to target victims, this specific malware is unusual as it uses Ethereum smart contracts to host the URLs where malicious commands are located for downloading the second-stage malware. It gets even more fancy: the way Etherscan was tricked showing the wrong implementation contract is based on setting 2 different proxy slots in the same frontrunning tx. So Etherscan uses a certain heuristic that incorporates different storage slots to retrieve the implementation… https://t.co/8VSCKK7DfY pic.twitter.com/OyxcxZwg5N — sudo rm -rf –no-preserve-root / (@pcaversaccio) July 10, 2025 Notably, the cybersecurity researchers acknowledge that they haven’t encountered this approach previously. Two-File Malware Hides a $2.5M Bridge Exploit Method The researchers uncovered a Solana-trading-bot infected by the malicious colortoolsv2 package called solana-trading-bot-v2, which appears to be a trustworthy GitHub project to the average observer. Source: ReversingLabs It has thousands of commits, several active contributors, and a decent number of stars and watchers, all characteristics of legitimate open-source repositories. However, all these details were fabricated, and any developer who installs it risks having user wallets that interact with the bot drained of funds. Software supply chain attacks targeting smart contracts and blockchain infrastructure are now on the rise. In July, hackers exploited a vulnerability in Arcadia Finance’s Rebalancer contract, draining approximately $2.5 million in cryptocurrency from the decentralized finance platform operating on Base blockchain. The attackers manipulated arbitrary swapData parameters to execute unauthorized swaps that emptied user vaults. A recent report by blockchain analytics firm Global Ledger revealed that hackers have now stolen $3 billion worth of crypto in 119 separate incidents during the first half of 2025, which is 150% more than all of 2024. Slava Demchuk, CEO of analytics firm AMLBot, said access-control flaws and smart contract vulnerabilities, especially in bridges, continue to be dominant attack methods. Demchuk told Cryptonews that these hackers are exploiting the interconnected and composable nature of decentralized finance (DeFi) protocols to amplify the impact. Blockchain auditors advised that it is critical for developers to assess each library they are considering implementing before deciding to include it in their development cycle. The post Hackers Exploit Ethereum to Inject Malware in Popular Coding Libraries appeared first on Cryptonews .


면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.