掃碼下載
BTC $76,659.92 -1.32%
ETH $2,273.96 -2.08%
BNB $623.77 -0.41%
XRP $1.39 -2.09%
SOL $83.90 -2.19%
TRX $0.3232 -0.09%
DOGE $0.0992 +1.26%
ADA $0.2460 -0.57%
BCH $445.56 -0.39%
LINK $9.23 -1.02%
HYPE $40.75 -3.95%
AAVE $97.35 +1.57%
SUI $0.9251 -0.26%
XLM $0.1646 -2.48%
ZEC $336.19 -4.48%
BTC $76,659.92 -1.32%
ETH $2,273.96 -2.08%
BNB $623.77 -0.41%
XRP $1.39 -2.09%
SOL $83.90 -2.19%
TRX $0.3232 -0.09%
DOGE $0.0992 +1.26%
ADA $0.2460 -0.57%
BCH $445.56 -0.39%
LINK $9.23 -1.02%
HYPE $40.75 -3.95%
AAVE $97.35 +1.57%
SUI $0.9251 -0.26%
XLM $0.1646 -2.48%
ZEC $336.19 -4.48%

駭客利用以太坊智能合約隱藏惡意軟體,繞過安全檢測

2025-09-04 12:04:52
收藏

ChainCatcher 消息,据 ReversingLabs 研究人員披露,7 月發布的 NPM 包 "colortoolsv 2" 和 "mimelib 2" 利用以太坊智能合約隱藏惡意 URL,避免安全掃描。這些軟體包作為下載器運行,從智能合約中獲取命令與控制伺服器地址,再下載二階段惡意軟體,使區塊鏈流量看似合法,從而加大檢測難度。

研究指出,這是首次發現以太坊智能合約被用於托管惡意命令 URL,顯示攻擊者在開源倉庫中規避檢測的策略正快速演化。

app_icon
ChainCatcher 與創新者共建Web3世界