Skip to content

Cybercriminals Secretly Insert Malicious Software in Ethereum Blockchain Contracts to Escape Detection

Uncovered by ReversingLabs: NPM packages employing Ethereum contracts to conceal malicious URLs, avoiding detection in security checks.

Malicious Software Camouflaged in Ethereum Coded Contracts to Dodge Detectors
Malicious Software Camouflaged in Ethereum Coded Contracts to Dodge Detectors

Cybercriminals Secretly Insert Malicious Software in Ethereum Blockchain Contracts to Escape Detection

In the ever-evolving landscape of software security, a new and concerning trend has emerged. A recent discovery has highlighted the increasing complexity and unconventional challenges that attackers are experimenting with.

The main infection vectors in this case were GitHub projects, with malicious behavior disguised within npm package dependencies. Specifically, two npm packages, colortoolsv2 and mimelib2, published in July 2025, were found to be malicious. These packages, however, were made to appear trustworthy, a tactic used by threat actors to bypass security measures.

What made these packages particularly insidious was their use of Ethereum smart contracts to hide malware commands. This innovative approach blends emerging technologies with creative tactics, underscoring the evolution of cyber threats.

It's important to note that the specific publishers of these malicious packages have not been named in the available information.

Interestingly, the malicious activity was not found in the source code present in GitHub repositories, but rather in an npm package. This discovery serves as a reminder of the need for thorough research and consultation with a qualified financial adviser before making any investment decisions in the crypto space.

Moreover, threat actors are now using Ethereum smart contracts to host URLs containing malicious commands that deliver second-stage malware. This development underscores the importance of vigilance and the need for continuous updates and improvements in cybersecurity measures.

As the digital world continues to expand, so too do the methods used by cybercriminals. Staying informed and taking proactive measures to protect your digital assets is more crucial than ever.

Read also: