%{{tag.tag}} {{articledata.title}} {{moment(articledata.cdate)}} @{{articledata.company.replace(" ","")}} comment Increasingly sophisticated %Cryptocurrency hackers are now hiding behind %Ethereum (CRYPTO: $ETH ) smart contacts to infect computers with malware. Researchers recently uncovered two malicious malware packages that used Ethereum smart contracts to conceal harmful code, allowing the malware to bypass traditional security systems. Specifically, hackers used Ethereum's %Blockchain to hide URLs that directed compromised systems to download malware. By embedding these commands within a smart contract, attackers disguised their activity as legitimate blockchain traffic, making detection nearly impossible, say analysts. Past attacks have used trusted services like %Microsoft (NASDAQ: $MSFT ) GitHub, %Google Drive (NASDAQ: $GOOGL ), or OneDrive to host malicious links. By now employing Ethereum smart contracts, hackers have added a crypto twist to a dangerous supply chain tactic for embedding malware. Hacks and thefts involving cryptocurrencies are becoming more common, sophisticated, and brazen, say analysts. In 2024, hackers stole $2.2 billion U.S. of crypto, up 17% from 2023. Hackers most frequently try to access crypto wallet credentials so they can steal digital assets and funds. But the use of Ethereum smart contracts as a delivery mechanism for malware takes crypto hacking in a new direction, say analysts and experts.