Reports have disclosed that hackers are taking advantage of Ethereum smart contracts to conceal malware commands, creating a fresh challenge for cybersecurity teams.

Researchers say the method lets attackers hide behind blockchain traffic that often looks legitimate, making detection far more difficult.

New Attack Vector Surfaces

According to digital asset compliance firm ReversingLabs, two packages uploaded to the Node Package Manager (NPM) repository in July were found to use this method.

The packages, “ colortoolsv2 ” and “ mimelib2 ,” appeared harmless on the surface but contained hidden functions that pulled instructions from Ethereum smart contracts .

Instead of directly hosting malicious links, they acted as downloaders, retrieving addresses for command-and-control serv

See Full Page