top of page
Betterworld Logo

Ethereum Smart Contracts Weaponized in npm Supply Chain Attack Targeting Crypto Developers

Updated: Sep 16

A new cybersecurity breach has alarmed the developer and cryptocurrency communities after researchers revealed that malicious npm packages are exploiting Ethereum smart contracts to deliver malware. The campaign, first seen in July 2025, was designed to target crypto developers by hiding malware distribution in what appeared to be regular blockchain activity.

Ethereum | BetterWorld Technology

Key Takeaways

  • Malicious npm packages used Ethereum smart contracts to conceal and retrieve URLs for second-stage malware.

  • Fake GitHub repositories were set up to appear as credible cryptocurrency trading bots, drawing in unsuspecting developers.

  • The approach blends social engineering with blockchain stealth, making attacks harder to detect with traditional security methods.

  • Developers are urged to enforce stricter vetting of open-source packages and maintainers.

How the Attack Worked

The operation revolved around two npm packages, named and , which, when installed, accessed Ethereum smart contracts to fetch hidden URLs. Those URLs led to additional malware payloads, effectively allowing cybercriminals to bypass typical checks for suspicious links or commands in code repositories.

Unlike many prior attacks, this campaign adopted a two-pronged strategy. On one side, it masqueraded as routine blockchain operations, allowing malicious actions to blend in with legitimate crypto traffic. On the other, attackers used fake trading bot repositories on GitHub, complete with numerous fabricated commits and inflated activity stats to gain developers’ trust.

Sophistication in Social Engineering

These malicious repositories posed as automated cryptocurrency trading tools (for platforms like Solana and Ethereum) and showcased what seemed like active development communities. Sockpuppet accounts drove artificial stars, forks, and repository watches, further increasing credibility. In reality, much of the activity involved repetitive, non-substantive changes, such as frequent LICENSE file edits, rather than meaningful code development.

The tactic leverages both technical and psychological manipulation, showing the growing complexity and reach of supply chain attacks in the open-source ecosystem.

Blockchain Technology as a Malware Tool

The innovative use of smart contracts to transport malware links marks a significant escalation in attackers’ ability to evade traditional security measures. Smart contracts execute automatically on the blockchain and are typically considered legitimate components in crypto software. By embedding malicious URLs here, attackers can mask their activities as normal blockchain interactions, complicating detection.

Researchers have noted similar patterns emerging outside of Ethereum as well, with previous campaigns observed in blockchains such as Solana and Bitcoin.

Essential Lessons for Developers

This incident is a stark reminder that open-source software, including widely-used package managers like npm, is an increasingly attractive target for sophisticated threat actors. Security experts recommend:

  1. Verifying the legitimacy of packages and their maintainers beyond basic commit or download counts.

  2. Closely examining repository history and looking for signs of inorganic activity or orchestrated engagement.

  3. Paying special attention to any package that involves interaction with blockchains or smart contracts, given the potential for abuse.

As attackers adopt ever-more complex tactics to breach supply chains, due diligence and community vigilance remain key defenses for developers and organizations alike. As cyber threats become increasingly sophisticated, your security strategy must evolve to keep pace. BetterWorld Technology offers adaptive cybersecurity solutions that grow with the threat landscape, helping your business stay secure while continuing to innovate. Reach out today to schedule your personalized consultation.

Sources

  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers, The Hacker News.

  • Crypto Hackers Exploit Ethereum Smart Contracts in NPM Attacks, CoinLaw.

  • Attackers Exploit Ethereum Smart Contracts in Supply Chain Breach, CoinTrust.

Join our mailing list

bottom of page