✅ Hacker has just discovered a new technique to hide malware in Ethereum smart contracts to bypass the security scanning system.
According to ReversingLabs, 2 malicious NPM packages colortoolsv2 and mimelib2 ( released in month 7) exploited smart contracts to hide the URL for downloading malware. Once installed, these packages query the blockchain to retrieve the C2 server address, from which they download stage 2 malware without raising suspicion as blockchain traffic is usually legitimate.
🔎 This is part of a sophisticated scam campaign on GitHub: creating fake crypto trading bot repos, phantom commits, multiple maintainer accounts to increase credibility.
👉 New trends show that hackers are rapidly combining blockchain + social engineering to evade detection. #Ethereum Cybersecurity #Malware
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
✅ Hacker has just discovered a new technique to hide malware in Ethereum smart contracts to bypass the security scanning system.
According to ReversingLabs, 2 malicious NPM packages colortoolsv2 and mimelib2 ( released in month 7) exploited smart contracts to hide the URL for downloading malware. Once installed, these packages query the blockchain to retrieve the C2 server address, from which they download stage 2 malware without raising suspicion as blockchain traffic is usually legitimate.
🔎 This is part of a sophisticated scam campaign on GitHub: creating fake crypto trading bot repos, phantom commits, multiple maintainer accounts to increase credibility.
👉 New trends show that hackers are rapidly combining blockchain + social engineering to evade detection.
#Ethereum Cybersecurity #Malware