Close Menu
Crypto Valley Journal
    Facebook X (Twitter) Instagram
    Crypto Valley Journal
    • Hot Topics
      • News
      • Minds
    • Focus
      • Background
      • Blockchain
      • Legal & Compliance
      • Non-Fungible Token (NFTs)
    • Investing
      • Markets
      • Financial Products
      • Decentralized Finance (DeFi)
      • Exchange overview
    • Education
      • Basics
      • Glossary
      • Politicians on crypto
    • Statistics
      • Bitcoin-ETF-Flows
      • Ethereum-ETF-Flows
      • Crypto market data
      • On-chain data
    • Academy
      • Overview
      • Part 1: Blockchain
      • Part 2: Money
      • Part 3: Bitcoin
      • Part 4: Cryptocurrencies
      • Part 5: Decentralized Finance
      • Part 6: Investing
    • English
      • Deutsch
    Crypto Valley Journal
    You are at:Home»Hot Topics»News»NPM malware leads to crypto losses
    NPM malware leads to crypto losses

    NPM malware leads to crypto losses

    By Editorial Office CVJ.CH on 9. September 2025 News

    Cybercriminals have developed two malicious npm packages - colortoolsv2 and mimelib2 - that target developer environments by using Ethereum blockchain smart contracts as a disguise mechanism. This sophisticated method enables the download of harmful software in an unexpected way.

    The npm packages, uploaded in July 2025, use Ethereum smart contracts to conceal the URLs for downloader malware. When used within a project, they fetch additional malware through these blockchain links. The campaign leveraged targeted GitHub repositories and manipulated popularity tactics to lure developers. Thanks to the rapid identification of the vulnerabilities, the overall damage remained limited, as Hackernews reported.

    Subscribe to our newsletter

    The best articles of the week, directly delivered into your mailbox.

    How did the attack work?

    As soon as one of the packages (colortoolsv2 or mimelib2) is integrated into a project, an obfuscated code activates a smart contract on the Ethereum blockchain that contains the address of the next malware download location. This method - known as “EtherHiding” - cleverly conceals the malicious command from traditional scans. The GitHub repositories using these packages posed as legitimate trading bot projects. Behind them was a network (Stargazers Ghost Network), whose fake accounts manipulated repository metrics to gain trust.

    These cyberattacks are carried out through so-called supply chain attacks: malicious packages are indirectly distributed via popular repositories. Developers should therefore carefully examine libraries before use - particularly their origin, maintainers, and code. Tools for analyzing dependencies, chains, and smart contract activity can provide critical protection here.

    Ray Dalio’s Bridgewater Associates Minds

    Star investor Ray Dalio considers Bitcoin inferior to gold

    CLARITY Act DeFi Background

    CLARITY Act: The year’s most important crypto deal heads for a decision

    JPMorgan warns: Recurring DeFi exploits and stagnant ETH-denominated TVL curb institutional engagement in the DeFi sector. DeFi

    JPMorgan: DeFi hacks and TVL losses weigh on institutional investors

    Basics

    Unit bias in crypto: Why cheap coins mislead investors

    Ray Dalio’s Bridgewater Associates Minds

    Star investor Ray Dalio considers Bitcoin inferior to gold

    CLARITY Act DeFi Background

    CLARITY Act: The year’s most important crypto deal heads for a decision

    What does this mean for developers?

    The combination of the open-source ecosystem and blockchain technology makes this attack particularly dangerous. While classic supply chain attacks often rely on tampered libraries, the use of Ethereum smart contracts adds an extra layer of obfuscation. This makes it significantly harder for security tools to detect malicious activity at an early stage.

    Security researchers are therefore calling for stronger collaboration between platforms like npm, GitHub, and blockchain analysts. Only if malicious packages are reported and blocked more quickly - and their smart contract infrastructure uncovered - can the damage be contained. At the same time, experts urge developers to continuously monitor their dependencies and integrate automated scans into their CI/CD pipelines.

    Share. Facebook Twitter LinkedIn Email Telegram WhatsApp

    About the author

    Editorial Office CVJ.CH

      The CVJ editorial staff consists of a team of Blockchain experts and informs daily and independently about the most exciting news.

      Related Articles

      CVJ.CH Weekly review calendar week

      Weekly review calendar week 19 – 2026

      JPMorgan sees Bitcoin ahead of gold in the debasement trade: GLD loses 2.7% AUM, IBIT gains 1.5% AUM since Iran war outbreak.

      JPMorgan: Bitcoin overtakes gold in the debasement trade

      The Canton of Lucerne joins the Swiss Blockchain Federation as its seventh member canton, with 73 active blockchain companies.

      Canton of Lucerne joins Swiss Blockchain Federation

      CVJ.CH Weekly review calendar week
      9. May 2026

      Weekly review calendar week 19 – 2026

      JPMorgan sees Bitcoin ahead of gold in the debasement trade: GLD loses 2.7% AUM, IBIT gains 1.5% AUM since Iran war outbreak.
      8. May 2026

      JPMorgan: Bitcoin overtakes gold in the debasement trade

      Bitcoin regime shift in question as April rally pushes BTC above $80k, with $2.4 billion in ETF inflows and patient capital building support.
      8. May 2026

      Spring cleaning: Bitcoin tests the regime shift above $80k

      twitter image button instagram image button linkedin image button youtube image button

      About Crypto Valley Journal
      About Crypto Valley Journal

      On the pulse of the movement

      • Academy
      • Contact
      • Advertising
      • About us
      • Partner
      • Imprint
      • Privacy
      • Disclaimer
      Search

      Type above and press Enter to search. Press Esc to cancel.