Cybersecurity researchers have uncovered a new and sophisticated attack method where hackers use Ethereum smart contracts to conceal and distribute malicious code. This alarming discovery highlights the growing convergence of blockchain technology and cybercrime, making detection far more challenging for traditional security tools.
According to experts at ReversingLabs, attackers injected two malicious NPM packages—named colortoolsv2 and mimelib2—into the world’s largest JavaScript library repository in July 2025. Once downloaded, these packages connected directly to the Ethereum blockchain, extracting command-and-control server addresses that appeared completely legitimate. This technique allowed the malware to bypass standard network traffic scanning tools, since all requests were masked as normal blockchain interactions.
The malicious code operated in two stages. First, the packages embedded into development projects without raising suspicion. Then, by leveraging Ethereum contracts as storage for hidden instructions, they retrieved remote server addresses to download the second stage of the malware. In effect, this turned regular smart contracts into tools for masking malicious URLs—a breakthrough tactic that makes detection and prevention significantly more difficult.
What makes this campaign even more dangerous is its integration with social engineering strategies. The attackers set up fake GitHub repositories, posing as developers of trading bots for cryptocurrencies. To enhance credibility, they published fake commits, created multiple supporting accounts, and even included detailed documentation, making the repositories appear authentic to unsuspecting developers.
While blockchain exploitation in cyberattacks is not entirely new—groups like Lazarus have used similar methods in the past—ReversingLabs emphasized that this particular approach is unprecedented. Instead of distributing malware directly through blockchain networks, hackers used Ethereum contracts only for managing control links, representing a major evolution in evasion techniques.
The threat extends beyond Ethereum. In recent months, cybersecurity analysts have documented similar campaigns against other ecosystems. A fake Solana trading bot was found stealing crypto wallets, while Bitcoinlib, a widely used Python library, was previously targeted by attackers. These patterns show that open-source repositories are becoming prime hunting grounds for cybercriminals, who exploit the trust-based nature of collaborative development.
Conclusion: The discovery of Ethereum-based malware concealment demonstrates how hackers are combining blockchain technologies with social engineering to outmaneuver defenses. As open-source ecosystems expand, developers must remain vigilant, applying stringent code reviews, package verification, and blockchain traffic monitoring to prevent infections. With attacks becoming more creative and stealthy, organizations and independent developers alike must adopt proactive security measures to protect against this rising wave of blockchain-powered cyber threats.





