• Advertise with us
  • Pricing
  • Submit News
Instagram Twitter Facebook Telegram Youtube Linkedin
EdaFace Newsfeed
EdaFace Newsfeed EdaFace
  • News
    • Price Analysis

    Main News

    • Crypto News
    • Bitcoin and BTC
    • Altcoin News
    • Security & Hacks
    • ICO & Token Sales
    • Interviews & Profiles

    Information

    • Press Release
    • Research Report
    • Regulations, Law & Policy
    • Community/Guest Post
    • Events & Conferences
    • Tutorials & Guides

    Market

    • Technical Analysis
    • Price Analysis
    • Cryptocurrency Price Prediction
    • DeFi (Decentralized Finance)
    • Mining & Staking

    Other Categories

    • NFTs & Digital Art
    • Opinion & Editorials
    • Tech Innovations
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
More
  • News
    • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
Reading: Ethereum Smart Contracts Misused As Tools For Hiding Malware
Share
Sign In
EdaFace Newsfeed
EdaFace Newsfeed EdaFace
EdaFace Newsfeed > Latest News > Crypto News > Ethereum Smart Contracts Misused As Tools For Hiding Malware
Crypto News

Ethereum Smart Contracts Misused As Tools For Hiding Malware

vitalclick
Last updated: September 4, 2025 9:02 am
1 hour ago
Share
SHARE

Contents
Simple Packages With Hidden MalwaresUsing Smart Contracts as a Stealth ToolHackers Are Getting More Creative How GitHub Was Used as Trap

Ethereum, the backbone of crypto apps and DeFi projects, is increasingly being used as a tool for cyberattacks.

Researchers at ReversingLabs have found two npm packages that hid malicious commands inside Ethereum smart contracts, marking a new twist in software supply chain attacks.

Read on to know how this was carried out.

Simple Packages With Hidden Malwares

The two packages, colortoolsv2 and mimelib2, looked like harmless tools, but they secretly pulled in downloader malware. These packages are part of a broader, sophisticated campaign spreading across npm and GitHub.

In July, RL discovered colortoolsv2 using blockchain to deliver malware. It was quickly removed, but a near-identical package called mimelib2 soon appeared with the same malicious code. 

Both npm packages were minimal and carried only the malware, while their GitHub repositories were made to look polished and reliable to fool developers.

Using Smart Contracts as a Stealth Tool

What makes this campaign stand out is how the attackers used Ethereum smart contracts to hide malicious URLs.

Colortoolsv2 appeared to be a basic npm package with only two files. Hidden inside was a script that downloaded additional malware from a command-and-control server. Usually, malware campaigns hardcode URLs into their code, which makes them easier to detect. 

In this case, the URLs were stored inside Ethereum smart contracts, making it much harder to track and shut down the attack.

“That’s something we haven’t seen previously, and it highlights the fast evolution of detection evasion strategies by malicious actors who are trolling open source repositories and developers,” the researchers said. 

Hackers Are Getting More Creative 

This attack is part of a growing trend where hackers are finding new ways to deliver malware. In 2023, some Python packages hid malicious URLs inside GitHub Gists, and in 2022, a fake Tailwind CSS npm package stored malware links behind trusted platforms like Google Drive and OneDrive.

eth

How GitHub Was Used as Trap

The attackers also built fake GitHub repositories to make their campaign more convincing.

Attackers set up fake repositories tied to the colortoolsv2 package, posing as crypto trading bots. These projects looked convincing, with thousands of commits, active contributors, and plenty of stars. 

But the activity and popularity were faked to trick developers into downloading poisoned code.

This campaign didn’t stop with solana-trading-bot-v2. Other repos like ethereum-mev-bot-v2, arbitrage-bot, and hyperliquid-trading-bot also showed fake commits and activity, though less convincing.

Last year saw 23 campaigns where attackers planted malicious code in open-source repos, including the ultralytics PyPI crypto miner and an April 2025 malware attempt on local crypto tools. 

For developers, this is a reminder to carefully vet open-source libraries. Stars, downloads, and activity do not guarantee trust. Both code and maintainers need to be thoroughly reviewed before integration.

You Might Also Like

Do Kwon’s Criminal Fraud Trial Set for January 2026

Tim Draper Predicts Bitcoin Price Will ‘Blow Past $250,000’, Blames SEC for Delayed Rallies

Can Price Break Free from Resistance?

Breaking News: Bitcoin Back at $60,000, Crypto Soars! What Do Experts Say?

Bitcoin All-Time High in Next 7 Days? Here’s Why

TAGGED:CryptoNews
Share This Article
Facebook Twitter Email Print
Previous Article “Don’t Let the U.S. Fall Behind in Tokenization”- Wintermute Warns SEC
Next Article Will WLFI Token Price Hit $1 in the Next 15 Days? Analysts Weigh In
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Crypto Live Widget

Follow for Live Updates
Subscribe to our newslettern

Get Newest Articles Instantly!

- Advertisement -
Ad imageAd image
Popular News
Cryptocurrency Regulation in Russia : Blockchain Development
Current Cryptocurrency Regulations in India
Explore Cryptocurrency Regulation in South Korea
2 Altcoins Win Trial
Claimed Bitcoin Inventor Craig Wright Gets Shocked in Court! His Assets Are Frozen

Company

  • Vision
  • Mission
  • LitePaper
  • Whitepaper
  • Core Values
  • Branding
  • Teams
  • Career Listing
  • FAQ
  • Welfare Donations

Products

  • EDA Token
  • Blockchain Literature
  • EdaFace Dex
  • EdaFace Mall
  • Listing Platforms
  • Newsfeed
  • NFT Marketplace
  • P2P Market
  • Scam Verification Centre
  • School of Crypto

Legal

  • Term of Use
  • Privacy Policy
  • Disclaimer
  • Listing T&C
  • Listing Platforms
  • Eda Token Policy

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

EdaFace

About US

EdaFace is a user interface aggregator that brings all the various functionalities of the crypto industry onto a single platform! You can advertise, launch and crowdfund your crypto project via EdaFace Launchpad and Newsfeed.

Contact us: support@edaface.com

Follow us

Instagram Twitter Facebook Telegram Youtube Linkedin

Copyright © 2022 – 2024. EdaFace is a product of Emerging Digital Age (EDA) Pty Ltd. All Rights Reserved.

Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.
EdaFace
Welcome Back!

Sign in to your account

Lost your password?