• Ethereum
  • Hacks & Exploits
  • Blockchain

Hackers Exploit Ethereum Smart Contracts to Spread Malware

9/5/2025
2min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert at Airdrops.com
9/5/2025
2min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert

A New Twist in Crypto Cyberattacks

Ethereum smart contracts are being weaponized to deliver malware, according to findings by security firm ReversingLabs. The company identified two malicious Node Package Manager (NPM) librariescolortoolsv2 and mimelib2—that used Ethereum contracts as part of a malware distribution chain.

Lucija Valentić, a software threat researcher at ReversingLabs, explained: “Downloaders’ that retrieve late-stage malware are being published to the npm repository weekly—if not daily. What is new and different is the use of Ethereum smart contracts to host the URLs where malicious commands are located, downloading the second-stage malware.”

The technique forms part of what researchers describe as a “sophisticated campaign” aimed at compromising developers via poisoned blockchain-related code libraries.

How the Attack Works

The infected NPM packages contained two files. One ran a script that accessed an Ethereum smart contract, which then provided the link to download the second-stage malware. This design allowed attackers to evade detection and use blockchain’s decentralized nature as an unconventional delivery method

ReversingLabs uncovered that the malicious packages were connected to a wider network of GitHub repositories, many of which were branded as crypto trading bots or token sniping tools. While the NPM packages themselves were relatively simple, the repositories were dressed up to look authentic, with thousands of commits, stars, and even fake contributors.

Valentić noted: “Even though the NPM package wasn’t very sophisticated, there was much more work put into making the repositories holding the malicious package look trustworthy.”

Open Source: A Hidden Risk

The campaign highlights the dangers of trusting open-source software without verification. Attackers appear to be exploiting the assumption that public repositories are automatically safe because they are openly visible.

0xToolman, an on-chain sleuth at Bubblemaps, warned: “It is especially dangerous because programmers wouldn't think it'd be an issue when they use publicly maintained codebases… it would take so much time to check every code he is using as he did not write it.”

The poisoned packages demonstrate how fake reputational signals—like stars and activity—can lull developers into installing dangerous software.

Binance Identifies DPRK as Major Threat

Major crypto exchange Binance has already flagged package poisoning as a growing attack vector linked to North Korean state actors. Employees are required to carefully audit NPM libraries as part of internal security protocols.

Binance Chief Security Officer Jimmy Su emphasized the seriousness of the issue, stating: “The largest vector currently against the crypto industry is state actors, particularly in the DPRK, [with] Lazarus. They’ve had a crypto focus in the last two, three years and have been quite successful in their endeavors.”

Chainalysis previously reported that North Korean hackers were responsible for 61% of all stolen crypto in 2024, amounting to $1.3 billion. More recently, the FBI attributed the record $1.4 billion Bybit hack to DPRK-affiliated attackers, underscoring the scale of the threat.

A Growing Challenge for the Crypto Industry

The use of Ethereum smart contracts for malware delivery represents a significant escalation in tactics. Unlike traditional attack methods, this approach leverages blockchain’s transparency and decentralization, making it harder to shut down.

With state-sponsored hackers continually innovating, the crypto industry faces mounting pressure to bolster defenses. As Valentić warned, the sophistication of these campaigns signals that attackers are becoming more strategic, and open-source communities remain a prime target.

For developers and exchanges alike, vigilance is no longer optional—it is the frontline defense against a new era of blockchain-enabled cybercrime.

Share with your friends on social media:

Join the community and don't miss a crypto giveaway.

Subscribe for updates by e-mail with the latest research reviews, airdrop news, reward programs, event updates about upcoming airdrops.

By entering your email address you are accepting our Terms & Conditions and Privacy & Cookie Policy.