News
  • Nidhi Kolhapur
    author-profile
    Nidhi Kolhapur right arrow
    Author

    Nidhi is a Certified Digital Marketing Executive and Passionate crypto Journalist covering the world of alternative currencies. She shares the latest and trending news on Cryptocurrency and Blockchain.

    • author facebook
    • author twitter
    • linkedin
  • Reviewed by: Qadir AK
    author profile
    Qadir AK right arrow
    Reviewed

    Qadir Ak is the founder of Coinpedia. He has over a decade of experience writing about technology and has been covering the blockchain and cryptocurrency space since 2010. He has also interviewed a few prominent experts within the cryptocurrency space.

    • author facebook
    • author twitter
    • author linkedin
  • 2 minutes read

Ethereum Smart Contracts Misused As Tools For Hiding Malware

Story Highlights
  • Researchers find two npm packages hiding malware inside Ethereum smart contracts

  • The campaigns showed inflated start, commits and contributors, to appear trustworthy

  • 23 crypto malware campaigns in open-source repos were reported last year

Ethereum, the backbone of crypto apps and DeFi projects, is increasingly being used as a tool for cyberattacks.

Researchers at ReversingLabs have found two npm packages that hid malicious commands inside Ethereum smart contracts, marking a new twist in software supply chain attacks.

Read on to know how this was carried out.

Simple Packages With Hidden Malwares

The two packages, colortoolsv2 and mimelib2, looked like harmless tools, but they secretly pulled in downloader malware. These packages are part of a broader, sophisticated campaign spreading across npm and GitHub.

In July, RL discovered colortoolsv2 using blockchain to deliver malware. It was quickly removed, but a near-identical package called mimelib2 soon appeared with the same malicious code. 

Both npm packages were minimal and carried only the malware, while their GitHub repositories were made to look polished and reliable to fool developers.

Using Smart Contracts as a Stealth Tool

What makes this campaign stand out is how the attackers used Ethereum smart contracts to hide malicious URLs.

Colortoolsv2 appeared to be a basic npm package with only two files. Hidden inside was a script that downloaded additional malware from a command-and-control server. Usually, malware campaigns hardcode URLs into their code, which makes them easier to detect. 

In this case, the URLs were stored inside Ethereum smart contracts, making it much harder to track and shut down the attack.

โ€œThatโ€™s something we havenโ€™t seen previously, and it highlights the fast evolution of detection evasion strategies by malicious actors who are trolling open source repositories and developers,โ€ the researchers said.ย 

Hackers Are Getting More Creative 

This attack is part of a growing trend where hackers are finding new ways to deliver malware. In 2023, some Python packages hid malicious URLs inside GitHub Gists, and in 2022, a fake Tailwind CSS npm package stored malware links behind trusted platforms like Google Drive and OneDrive.

eth

How GitHub Was Used as Trap

The attackers also built fake GitHub repositories to make their campaign more convincing.

Attackers set up fake repositories tied to the colortoolsv2 package, posing as crypto trading bots. These projects looked convincing, with thousands of commits, active contributors, and plenty of stars. 

But the activity and popularity were faked to trick developers into downloading poisoned code.

This campaign didnโ€™t stop with solana-trading-bot-v2. Other repos like ethereum-mev-bot-v2, arbitrage-bot, and hyperliquid-trading-bot also showed fake commits and activity, though less convincing.

Last year saw 23 campaigns where attackers planted malicious code in open-source repos, including the ultralytics PyPI crypto miner and an April 2025 malware attempt on local crypto tools. 

Never Miss a Beat in the Crypto World!

Stay ahead with breaking news, expert analysis, and real-time updates on the latest trends in Bitcoin, altcoins, DeFi, NFTs, and more.

For developers, this is a reminder to carefully vet open-source libraries. Stars, downloads, and activity do not guarantee trust. Both code and maintainers need to be thoroughly reviewed before integration.

FAQs

How are Ethereum smart contracts being used in cyberattacks?

Attackers are hiding malicious download URLs inside Ethereum smart contracts to evade detection, a new evasion tactic in software supply chain attacks.

Which npm packages were found to be malicious?

The packagesย colortoolsv2ย andย mimelib2ย contained hidden malware that downloaded additional payloads from attackers’ servers.

Why is using blockchain for malware delivery effective?

Storing malicious URLs on-chain makes attacks harder to detect and shut down compared to traditional hardcoded links in software.

Show More

Related Articles

Back to top button