✅ Hacker has just discovered a new technique to hide malware in Ethereum smart contracts to bypass the security scanning system.



According to ReversingLabs, 2 malicious NPM packages colortoolsv2 and mimelib2 ( released in month 7) exploited smart contracts to hide the URL for downloading malware. Once installed, these packages query the blockchain to retrieve the C2 server address, from which they download stage 2 malware without raising suspicion as blockchain traffic is usually legitimate.

🔎 This is part of a sophisticated scam campaign on GitHub: creating fake crypto trading bot repos, phantom commits, multiple maintainer accounts to increase credibility.

👉 New trends show that hackers are rapidly combining blockchain + social engineering to evade detection.
#Ethereum # Cybersecurity #Malware
ETH0.79%
BOT0.17%
CHO0.63%
View Original
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)