Hackers Unleash ‘Ethereal’ Attack: Sneaky Smart Contracts Target Devs via npm and GitHub
A new malicious campaign uses Ethereum smart contracts to cloak its activities, making it a master of disguise. Targeting developers via npm and GitHub, it cleverly conceals its command-and-control infrastructure within blockchain code. It’s a hacker’s version of “hide and seek,” only the stakes are much higher.

Hot Take:
When cybercriminals start using Ethereum smart contracts to cover their tracks, it’s safe to say they’ve leveled up from being just your run-of-the-mill digital mischief-makers to full-fledged tech ninjas. It’s like watching a magician making a rabbit disappear, but in this case, the rabbit is a C2 infrastructure and the hat is the blockchain. Welcome to the new age of cybercrime, where blockchain isn’t just for crypto anymore—it’s also for criminals who want to keep things on the down-low!
Key Points:
– Malicious npm packages, colortoolsv2 and mimelib2, used Ethereum smart contracts to conceal C2 infrastructure.
– These packages were tied to a larger GitHub campaign disguised as cryptocurrency trading tools.
– The attackers used fake accounts and fabricated activity to lend legitimacy to their operations.
– This reflects a growing trend of software supply chain attacks targeting open-source platforms.
– ReversingLabs emphasized the need for developers to employ stronger package assessment tools.