Hacker Inserts Malicious Code Into Popular Ethereum Development Tool With 6,000 Installs

Ethereum 2025-07-18 18:17

Cybersecurity researchers at ReversingLabs discovered two lines of malicious code embedded within an update for ETHCode, an open-source Ethereum development toolkit used by approximately 6,000 developers. The malicious code was inserted through a GitHub pull request that successfully bypassed both artificial intelligence security reviews and human oversight before being distributed to developer systems.


What to Know:

  • A hacker with no prior GitHub history inserted malware into ETHCode through a 43-commit pull request containing 4,000 updated lines
  • The malicious code was designed to download and execute scripts that could potentially steal cryptocurrency assets or compromise smart contracts
  • Both GitHub's AI reviewer and the development team failed to detect the sophisticated attack, raising concerns about open-source security practices

Attack Details Surface Through Investigation

The malicious pull request was submitted on June 17 by a user identified as Airez299, who had no previous contribution history on the platform. ReversingLabs researchers found that the attacker successfully obscured the malicious code by giving it a name similar to existing files while obfuscating the actual code structure.

The first line of malicious code was designed to blend seamlessly with legitimate files. The second line served as an activation mechanism that would ultimately create a PowerShell function designed to download and execute batch scripts from public file-hosting services.

Both GitHub's automated AI reviewer and members of 7finney, the group responsible for maintaining ETHCode, analyzed the massive code update. Only minor changes were requested during the review process, with neither human reviewers nor automated systems flagging the embedded malware as suspicious.

Potential Impact Reaches Thousands of Systems

ETHCode serves as a comprehensive suite of tools that enables Ethereum developers to build and deploy smart contracts compatible with the Ethereum Virtual Machine. The compromised update would have been automatically distributed to user systems through standard update mechanisms.

ReversingLabs researcher Petar Kirhmajer told Decrypt that the firm has found no evidence the malicious code was actually executed to steal tokens or data. However, the potential scope of the attack remains significant given the tool's user base.

"The pull request may have spread to thousands of developer systems," Kirhmajer noted in the research blog. ReversingLabs continues investigating the exact functionality of the downloaded scripts, operating under the assumption they were "intended to steal crypto assets stored on the victim's machine or, alternatively, compromise the Ethereum contracts under development by users of the extension."

The attack represents a sophisticated supply chain compromise that leveraged the trust inherent in open-source development processes.

Industry Experts Warn of Widespread Vulnerability

Ethereum developer and NUMBER GROUP co-founder Zak Cole emphasized that this type of attack reflects broader security challenges facing the cryptocurrency development ecosystem. Many developers install open-source packages without conducting thorough security reviews.

"It's way too easy for someone to slip in something malicious," Cole told Decrypt. "Could be an npm package, a browser extension, whatever."

The cryptocurrency industry's heavy reliance on open-source development creates an expanding attack surface for malicious actors. Cole pointed to recent high-profile incidents including the Ledger Connect Kit exploit from December 2023 and malware discovered in Solana's web3.js library.

"There's too much code and not enough eyes on it," Cole added. "Most people just assume stuff is safe because it's popular or been around a while, but that doesn't mean anything."

Cole noted that the addressable attack surface continues expanding as more developers adopt open-source tools. He also highlighted the involvement of state-sponsored actors in these attacks.

"Also, keep in mind that there are entire warehouses full of DPRK operatives whose full time job is to execute these exploits," Cole said.

Security Recommendations for Developers

Despite the sophisticated nature of the attack, security experts believe successful compromises remain relatively rare. Kirhmajer estimated that "successful attempts are very rare" based on his research experience.

ReversingLabs recommends that developers verify the identity and contribution history of code contributors before downloading or implementing updates. The firm also suggests reviewing package.json files and similar dependency declarations to evaluate new code relationships.

Cole advocated for additional security measures including dependency locking to prevent automatic inclusion of untested code updates. He recommended using automated scanning tools that can identify suspicious behavior patterns or questionable maintainer profiles.

Developers should also monitor for packages that suddenly change ownership or release unexpected updates. Cole emphasized the importance of maintaining separate environments for different development activities.

"Also don't run signing tools or wallets on the same machine you use to build stuff," Cole concluded. "Just assume nothing is safe unless you've checked it or sandboxed it."

Closing Thoughts

This incident highlights the ongoing security challenges facing open-source cryptocurrency development, where sophisticated attackers can exploit trust mechanisms to distribute malware to thousands of developer systems. While no evidence suggests the malicious code was successfully executed, the attack demonstrates the need for enhanced security practices and verification processes within the cryptocurrency development ecosystem.

Share to:

This content is for informational purposes only and does not constitute investment advice.

Curated Series

SuperEx Popular Science Articles Column

SuperEx Popular Science Articles Column

This collection features informative articles about SuperEx, aiming to simplify complex cryptocurrency concepts for a wider audience. It covers the basics of trading, blockchain technology, and the features of the SuperEx platform. Through easy-to-understand content, it helps users navigate the world of digital assets with confidence and clarity.

How do beginners trade options?How does option trading work?

How do beginners trade options?How does option trading work?

This special feature introduces the fundamentals of options trading for beginners, explaining how options work, their main types, and the mechanics behind trading them. It also explores key strategies, potential risks, and practical tips, helping readers build a clear foundation to approach the options market with confidence.

What are the risks of investing in cryptocurrency?

What are the risks of investing in cryptocurrency?

This special feature covers the risks of investing in cryptocurrency, explaining common challenges such as market volatility, security vulnerabilities, regulatory uncertainties, and potential scams. It also provides analysis of risk management strategies and mitigation techniques, helping readers gain a clear understanding of how to navigate the crypto market safely.

Bitcoin historical price data and trends

Bitcoin historical price data and trends

This special feature gathers multiple articles on Bitcoin’s historical price data, analyzing past trends, market cycles, and key events that shaped its value. It also explores factors influencing price movements, providing readers with insights into Bitcoin’s long-term performance and market patterns.

Detailed Illustrated Guide to Contract Trading

Detailed Illustrated Guide to Contract Trading

This collection, "Detailed Illustrated Guide to Contract Trading," explains the fundamentals of contract trading, including futures and margin trading. It uses clear illustrations to simplify key concepts, risk management strategies, and order types, making it accessible for both beginners and experienced traders.