Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers

Posted on September 3, 2025September 3, 2025 By CWS

Sep 03, 2025Ravie LakshmananMalware / Social Engineering
Cybersecurity researchers have found two new malicious packages on the npm registry that make use of sensible contracts for the Ethereum blockchain to hold out malicious actions on compromised techniques, signaling the development of menace actors always looking out for brand spanking new methods to distribute malware and fly beneath the radar.
“The 2 npm packages abused sensible contracts to hide malicious instructions that put in downloader malware on compromised techniques,” ReversingLabs researcher Lucija Valentić mentioned in a report shared with The Hacker Information.

The packages, each uploaded to npm in July 2025 and not accessible for obtain, are listed under –

The software program provide chain safety agency mentioned the libraries are half of a bigger and complex marketing campaign impacting each npm and GitHub, tricking unsuspecting builders into downloading and operating them.
Whereas the packages themselves make no effort to hide their malicious performance, ReversingLabs famous that the GitHub tasks that imported these packages took pains to make them look credible.
As for the packages themselves, the nefarious habits kicks in as soon as both of them is used or included in another venture, inflicting it to fetch and run a next-stage payload from an attacker-controlled server.
Though that is par for the course on the subject of malware downloaders, the place it stands aside is using Ethereum sensible contracts to stage the URLs internet hosting the payload – a way harking back to EtherHiding. The shift underscores the brand new techniques that menace actors are adopting to evade detection.
Additional investigation into the packages has revealed that they’re referenced in a community of GitHub repositories claiming to be a solana-trading-bot-v2 that leverages “real-time on-chain information to execute trades robotically, saving you effort and time.” The GitHub account related to the repository is not accessible.

It is assessed that these accounts are a part of a distribution-as-service (DaaS) providing referred to as Stargazers Ghost Community, which refers to a cluster of bogus GitHub accounts which are identified to star, fork, watch, commit, and subscribe to malicious repositories to artificially inflate their recognition.
Included amongst these commits are supply code adjustments to import colortoolsv2. Among the different repositories caught pushing the npm package deal are ethereum-mev-bot-v2, arbitrage-bot, and hyperliquid-trading-bot.
The naming of those GitHub repositories means that the cryptocurrency builders and customers are the first goal of the marketing campaign, utilizing a mixture of social engineering and deception.
“It’s important for builders to evaluate every library they’re contemplating implementing earlier than deciding to incorporate it of their improvement cycle,” Valentić mentioned. “And meaning pulling again the covers on each open supply packages and their maintainers: wanting past uncooked numbers of maintainers, commits and downloads to evaluate whether or not a given package deal – and the builders behind it – are what they current themselves as.”

The Hacker News Tags:Contracts, Crypto, Developers, Ethereum, Exploit, Malicious, NPM, Packages, Smart, Target

Post navigation

Previous Post: CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
Next Post: How to Use Biometrics Securely

Related Posts

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation The Hacker News
CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse The Hacker News
Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • Why Identity Security Must Move Beyond MFA
  • Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
  • How Smart MSSPs Using AI to Boost Margins with Half the Staff

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • Why Identity Security Must Move Beyond MFA
  • Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
  • How Smart MSSPs Using AI to Boost Margins with Half the Staff

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark