Hackers use Ethereum smart contracts to hide malware and bypass security detection
2025-09-04 12:04:52
ChainCatcher news, according to researchers from ReversingLabs, the NPM packages "colortoolsv 2" and "mimelib 2" released in July utilize Ethereum smart contracts to hide malicious URLs, avoiding security scans. These packages operate as downloaders, retrieving command and control server addresses from the smart contracts, and then downloading second-stage malware, making blockchain traffic appear legitimate, thereby increasing detection difficulty.
The research indicates that this is the first time Ethereum smart contracts have been found to host malicious command URLs, demonstrating that attackers' strategies to evade detection in open-source repositories are rapidly evolving.
相關專案
最新快訊
ChainCatcher
2025-09-08 17:44:02
ChainCatcher
2025-09-08 17:21:47
ChainCatcher
2025-09-08 17:20:43
ChainCatcher
2025-09-08 17:17:02
ChainCatcher
2025-09-08 16:58:46