掃碼下載
BTC $75,887.23 -2.61%
ETH $2,360.03 -3.83%
BNB $633.23 -1.86%
XRP $1.43 -4.32%
SOL $86.60 -4.08%
TRX $0.3297 +1.28%
DOGE $0.0955 -6.27%
ADA $0.2492 -6.22%
BCH $446.15 -2.73%
LINK $9.36 -4.57%
HYPE $44.22 -2.15%
AAVE $112.19 -5.18%
SUI $0.9618 -6.88%
XLM $0.1692 -3.72%
ZEC $324.95 -5.76%
BTC $75,887.23 -2.61%
ETH $2,360.03 -3.83%
BNB $633.23 -1.86%
XRP $1.43 -4.32%
SOL $86.60 -4.08%
TRX $0.3297 +1.28%
DOGE $0.0955 -6.27%
ADA $0.2492 -6.22%
BCH $446.15 -2.73%
LINK $9.36 -4.57%
HYPE $44.22 -2.15%
AAVE $112.19 -5.18%
SUI $0.9618 -6.88%
XLM $0.1692 -3.72%
ZEC $324.95 -5.76%

駭客利用以太坊智能合約隱藏惡意軟體,繞過安全檢測

2025-09-04 12:04:52
收藏

ChainCatcher 消息,据 ReversingLabs 研究人員披露,7 月發布的 NPM 包 "colortoolsv 2" 和 "mimelib 2" 利用以太坊智能合約隱藏惡意 URL,避免安全掃描。這些軟體包作為下載器運行,從智能合約中獲取命令與控制伺服器地址,再下載二階段惡意軟體,使區塊鏈流量看似合法,從而加大檢測難度。

研究指出,這是首次發現以太坊智能合約被用於托管惡意命令 URL,顯示攻擊者在開源倉庫中規避檢測的策略正快速演化。

app_icon
ChainCatcher 與創新者共建Web3世界