
Hackers Are Leveraging Ethereum Smart Contracts to Distribute Malware
In recent cybersecurity developments, hackers are now deploying Ethereum smart contracts to deliver malware. This emerging threat has been identified by software security firm ReversingLabs, marking a significant shift in how malicious actors attempt to infiltrate devices via blockchain-enabled platforms. The malicious activity is primarily being executed through compromised public code libraries, posing serious risks to developers and companies in the cryptocurrency industry.
How Ethereum Smart Contracts Are Being Exploited
ReversingLabs recently discovered two Node Package Manager (NPM) libraries—colortoolsv2 and mimelib2—that serve as conduits for malware distribution. These libraries leverage Ethereum smart contracts to host URLs containing malware commands, creating a two-stage infection process. The first stage involves downloading scripts via the NPM packages, while the second stage uses the smart contract to retrieve additional malicious payloads.
The use of Ethereum smart contracts in this manner is unprecedented. Lucija Valentić, a software threat researcher at ReversingLabs, described this technique as “a significant evolution in malware distribution mechanisms,” blending decentralized technology with traditional attack vectors.
The Risks for Developers and Open-Source Communities
The danger of poisoned public code libraries lies in their perceived trustworthiness. Developers often rely heavily on open-source platforms like GitHub and NPM for reusable code. Attackers exploit this trust by uploading seemingly legitimate packages with fake activity, such as thousands of stars and numerous commits, to build credibility. These repositories are often branded as crypto trading tools or sniping bots to further deceive users.
“It’s especially dangerous because programmers may assume that open-source code is safe by default,” said 0xToolman, an on-chain sleuth from Bubblemaps. The sheer volume of code used in projects makes detailed verification challenging, leaving room for vulnerabilities to slip through the cracks. This blind trust in public repositories has made poisoned libraries a preferred method for cybercriminals.
Increasing Threats from North Korean Hackers
Binance, one of the largest cryptocurrency exchanges globally, has identified package poisoning as a growing threat, especially by state-sponsored attackers from North Korea. Jimmy Su, Binance’s Chief Security Officer, flagged hackers affiliated with the Democratic People’s Republic of Korea (DPRK) as the most significant threat to the crypto industry. Su noted that hackers often use NPM library poisoning as a secondary method of attack, complementing tactics like impersonating employees or conducting fake interviews.
In 2024 alone, North Korean hackers accounted for 61% of all cryptocurrency stolen globally, amounting to a staggering $1.3 billion, according to a report by Chainalysis. This trend has only grown, with significant hacks like the $1.4 billion Bybit attack—a record-breaking security breach—being linked to DPRK-affiliated groups. To combat these threats, major crypto exchanges, including Binance, Coinbase, and Kraken, have formed intelligence-sharing alliances to detect and neutralize poisoned libraries swiftly.
Steps to Protect Yourself
Developers and organizations must exercise greater caution when integrating third-party code into their projects. Thoroughly vetting NPM packages and scrutinizing repository activity for signs of fakery are essential practices. Additionally, adopting robust cybersecurity protocols, such as endpoint protection and real-time code scanning tools like ReversingLabs, can significantly reduce risks.
One related product to consider is Snyk Open Source Security, a tool designed to help developers find and fix vulnerabilities in open-source dependencies. Utilizing tools like these ensures a proactive approach to addressing risks inherent in using third-party code libraries.
The Future of Cybersecurity in Crypto
As blockchain technology grows in complexity and adoption, so do the methods attackers use to exploit it. Innovations like Ethereum smart contracts offer immense benefits but also create new vulnerabilities that hackers are eager to exploit. By staying informed and adopting stringent security measures, developers and companies can stay ahead of these ever-evolving threats.