{"id":496801,"date":"2025-09-04T13:55:18","date_gmt":"2025-09-04T12:55:18","guid":{"rendered":"https:\/\/cryptoslate.com\/?p=496801"},"modified":"2025-09-04T13:46:55","modified_gmt":"2025-09-04T12:46:55","slug":"ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers","status":"publish","type":"post","link":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/","title":{"rendered":"Ethereum smart contracts quietly push javascript malware targeting developers"},"content":{"rendered":"<p>Hackers are using Ethereum smart contracts to conceal malware payloads inside seemingly benign npm packages, a tactic that turns the blockchain into a resilient command channel and complicates takedowns.<\/p>\n<p>ReversingLabs <a href=\"https:\/\/www.reversinglabs.com\/blog\/ethereum-contracts-malicious-code\">detailed<\/a> two npm packages, <i>colortoolsv2<\/i> and <i>mimelib2<\/i>, that read a contract on Ethereum to fetch a URL for a second-stage downloader rather than hardcoding infrastructure in the package itself, a choice that reduces static indicators and leaves fewer clues in source code reviews.<\/p>\n<p>The packages surfaced in July and were removed after disclosure. ReversingLabs traced their promotion to a network of GitHub repositories that posed as trading bots, including <i>solana-trading-bot-v2<\/i>, with fake stars, inflated commit histories, and sock-puppet maintainers, a social layer that steered developers toward the malicious dependency chain.<\/p>\n<p>The downloads were low, but the method matters. Per <a href=\"https:\/\/thehackernews.com\/2025\/09\/malicious-npm-packages-exploit-ethereum.html\">The Hacker News<\/a>, <i>colortoolsv2<\/i> saw seven downloads and <i>mimelib2<\/i> one, which still fits opportunistic developer targeting. <a href=\"https:\/\/security.snyk.io\/vuln\/SNYK-JS-COLORTOOLSV2-10734106\">Snyk<\/a> and <a href=\"https:\/\/osv.dev\/vulnerability\/MAL-2025-5842\">OSV<\/a> now list both packages as malicious, providing quick checks for teams auditing historical builds.<\/p>\n<h2>History repeating itself<\/h2>\n<p>The on-chain command channel echoes a broader campaign that researchers tracked in late 2024 across hundreds of npm typosquats. In that wave, packages executed install or preinstall scripts that queried an Ethereum contract, retrieved a base URL, and then downloaded OS-specific payloads named <code>node-win.exe<\/code>, <code>node-linux<\/code>, or <code>node-macos<\/code>.<\/p>\n<p>Checkmarx <a href=\"https:\/\/checkmarx.com\/uncategorized\/supply-chain-attack-using-ethereum-smart-contracts-to-distribute-multi-platform-malware\/\">documented<\/a> a core contract at <code>0xa1b40044EBc2794f207D45143Bd82a1B86156c6b<\/code> coupled with a wallet parameter <code>0x52221c293a21D8CA7AFD01Ac6bFAC7175D590A84<\/code>, with observed infrastructure at <code>45.125.67.172:1337<\/code> and <code>193.233.201.21:3001<\/code>, among others.<\/p>\n<p>Phylum\u2019s <a href=\"https:\/\/blog.phylum.io\/supply-chain-security-typosquat-campaign-targeting-puppeteer-users\/\">deobfuscation<\/a> shows the <code>ethers.js<\/code> call to <code>getString(address)<\/code> on the same contract and logs the rotation of C2 addresses over time, a behavior that turns contract state into a movable pointer for malware retrieval. Socket <a href=\"https:\/\/socket.dev\/blog\/massive-npm-malware-campaign-leverages-ethereum-smart-contracts\">independently<\/a> mapped the typosquat flood and published matching IOCs, including the same contract and wallet, confirming cross-source consistency.<\/p>\n<h2>An old vulnerability continues to thrive<\/h2>\n<p>ReversingLabs frames the 2025 packages as a continuation in technique rather than scale, with the twist that the smart contract hosts the URL for the next stage, not the payload.<\/p>\n<p>The GitHub distribution work, including bogus stargazers and chore commits, aims to pass casual due diligence and leverage automated dependency updates within clones of the fake repos.<\/p>\n<p>The design resembles earlier use of third-party platforms for indirection, for example GitHub Gist or cloud storage, but on-chain storage adds immutability, public readability, and a neutral venue that defenders cannot easily take offline.<\/p>\n<p>Per ReversingLabs, Concrete IOCs from these reports include the Ethereum contracts <code>0x1f117a1b07c108eae05a5bccbe86922d66227e2b<\/code> linked to the July packages and the 2024 contract <code>0xa1b40044EBc2794f207D45143Bd82a1B86156c6b<\/code>, wallet <code>0x52221c293a21D8CA7AFD01Ac6bFAC7175D590A84<\/code>, host patterns <code>45.125.67.172<\/code> and <code>193.233.201.21<\/code> with port 1337 or 3001, and platform payload names noted above.<\/p>\n<p>Hashes for the 2025 second stage include <code>021d0eef8f457eb2a9f9fb2260dd2e391f009a21<\/code>, and for the 2024 wave, Checkmarx lists Windows, Linux, and macOS SHA-256 values. ReversingLabs also published SHA-1s for each malicious npm version, which helps teams scan artifact stores for past exposure.<\/p>\n<h2>Protecting against the attack<\/h2>\n<p>For defense, the immediate control is to prevent lifecycle scripts from running during install and CI. npm documents the <code>--ignore-scripts<\/code> flag for <code>npm ci<\/code> and <code>npm install<\/code>, and teams can set it globally in <code>.npmrc<\/code>, then selectively allow necessary builds with a separate step.<\/p>\n<p>The Node.js security best practices page advises the same approach, together with pinning versions via lockfiles and stricter review of maintainers and metadata.<\/p>\n<p>Blocking outbound traffic to the IOCs above and alerting on build logs that initialize <code>ethers.js<\/code> to query <code>getString(address)<\/code> provide <a href=\"https:\/\/nodejs.org\/en\/learn\/getting-started\/security-best-practices\">practical detections<\/a> that align with the chain-based C2 design.<\/p>\n<p>The packages are gone, the pattern remains, and on-chain indirection now sits alongside typosquats and bogus repos as a repeatable way to reach developer machines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are using Ethereum smart contracts to conceal malware payloads inside seemingly benign npm packages, a tactic that turns the blockchain into a resilient command channel and complicates takedowns. ReversingLabs detailed two npm packages, colortoolsv2 and mimelib2, that read a contract on Ethereum to fetch a URL for a second-stage downloader rather than hardcoding infrastructure [&hellip;]<\/p>\n","protected":false},"author":1264,"featured_media":496809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76799,107,16041,9836,37],"tags":[],"post_folder":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.9 (Yoast SEO v21.9.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ethereum smart contracts quietly push javascript malware targeting developers<\/title>\n<meta name=\"description\" content=\"Attackers used on-chain storage and bogus repos to lure unsuspecting installs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethereum smart contracts quietly push javascript malware targeting developers\" \/>\n<meta property=\"og:description\" content=\"Attackers used on-chain storage and bogus repos to lure unsuspecting installs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoSlate\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-04T12:55:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T12:46:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/09\/ethereum-hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam &#039;Akiba&#039; Wright\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@akibablade\" \/>\n<meta name=\"twitter:site\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam 'Akiba' Wright\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\"},\"author\":{\"name\":\"Liam 'Akiba' Wright\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/ea2b02b41a7478e18d903ca8eec4979e\"},\"headline\":\"Ethereum smart contracts quietly push javascript malware targeting developers\",\"datePublished\":\"2025-09-04T12:55:18+00:00\",\"dateModified\":\"2025-09-04T12:46:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"articleSection\":[\"Crime\",\"Culture\",\"Hacks\",\"Scams\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\",\"url\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\",\"name\":\"Ethereum smart contracts quietly push javascript malware targeting developers\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/#website\"},\"datePublished\":\"2025-09-04T12:55:18+00:00\",\"dateModified\":\"2025-09-04T12:46:55+00:00\",\"description\":\"Attackers used on-chain storage and bogus repos to lure unsuspecting installs\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptoslate.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethereum smart contracts quietly push javascript malware targeting developers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptoslate.com\/#website\",\"url\":\"https:\/\/cryptoslate.com\/\",\"name\":\"CryptoSlate\",\"description\":\"Cryptocurrency News and Real-time Coin Data\",\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"NewsMediaOrganization\"],\"@id\":\"https:\/\/cryptoslate.com\/#organization\",\"name\":\"CryptoSlate\",\"url\":\"https:\/\/cryptoslate.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"CryptoSlate\"},\"image\":{\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/cryptoslate\",\"https:\/\/www.instagram.com\/cryptoslate\",\"https:\/\/www.linkedin.com\/company\/cryptoslate\",\"https:\/\/www.youtube.com\/c\/cryptoslate\",\"https:\/\/cryptoslate.substack.com\",\"https:\/\/t.me\/cryptoslatenews\",\"https:\/\/www.tiktok.com\/@cryptoslatenews\"],\"publishingPrinciples\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"ownershipFundingInfo\":\"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/\",\"actionableFeedbackPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"correctionsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"ethicsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"foundingDate\":\"2017-08-04\",\"founder\":[{\"@type\":\"Person\",\"name\":\"Nate Whitehill\"},{\"@type\":\"Person\",\"name\":\"Matthew Blancarte\"}],\"contactPoint\":[{\"@type\":\"ContactPoint\",\"contactType\":\"customer support\",\"url\":\"https:\/\/cryptoslate.com\/contact\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"sales\",\"url\":\"https:\/\/cryptoslate.com\/advertising\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"newsroom\",\"url\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"email\":\"tips@cryptoslate.com\",\"availableLanguage\":\"en-US\"}],\"masthead\":\"https:\/\/cryptoslate.com\/about\/#masthead\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/ea2b02b41a7478e18d903ca8eec4979e\",\"name\":\"Liam 'Akiba' Wright\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/10\/about-liam-150x150.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/10\/about-liam-150x150.jpg\",\"caption\":\"Liam 'Akiba' Wright\"},\"description\":\"Also known as \\\"Akiba,\\\" Liam Wright is the Editor-in-Chief at CryptoSlate and host of the SlateCast. He believes that decentralized technology has the potential to make widespread positive change.\",\"sameAs\":[\"http:\/\/www.akiba.gg\",\"https:\/\/twitter.com\/akibablade\"],\"url\":\"https:\/\/cryptoslate.com\/author\/liam-akiba-wright\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ethereum smart contracts quietly push javascript malware targeting developers","description":"Attackers used on-chain storage and bogus repos to lure unsuspecting installs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/","og_locale":"en_US","og_type":"article","og_title":"Ethereum smart contracts quietly push javascript malware targeting developers","og_description":"Attackers used on-chain storage and bogus repos to lure unsuspecting installs","og_url":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/","og_site_name":"CryptoSlate","article_published_time":"2025-09-04T12:55:18+00:00","article_modified_time":"2025-09-04T12:46:55+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/09\/ethereum-hacker.jpg","type":"image\/jpeg"}],"author":"Liam 'Akiba' Wright","twitter_card":"summary_large_image","twitter_creator":"@akibablade","twitter_site":"@cryptoslate","twitter_misc":{"Written by":"Liam 'Akiba' Wright","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#article","isPartOf":{"@id":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/"},"author":{"name":"Liam 'Akiba' Wright","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/ea2b02b41a7478e18d903ca8eec4979e"},"headline":"Ethereum smart contracts quietly push javascript malware targeting developers","datePublished":"2025-09-04T12:55:18+00:00","dateModified":"2025-09-04T12:46:55+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"articleSection":["Crime","Culture","Hacks","Scams","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/cryptoslate.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/","url":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/","name":"Ethereum smart contracts quietly push javascript malware targeting developers","isPartOf":{"@id":"https:\/\/cryptoslate.com\/#website"},"datePublished":"2025-09-04T12:55:18+00:00","dateModified":"2025-09-04T12:46:55+00:00","description":"Attackers used on-chain storage and bogus repos to lure unsuspecting installs","breadcrumb":{"@id":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cryptoslate.com\/ethereum-smart-contracts-quietly-push-javascript-malware-targeting-developers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptoslate.com\/"},{"@type":"ListItem","position":2,"name":"Ethereum smart contracts quietly push javascript malware targeting developers"}]},{"@type":"WebSite","@id":"https:\/\/cryptoslate.com\/#website","url":"https:\/\/cryptoslate.com\/","name":"CryptoSlate","description":"Cryptocurrency News and Real-time Coin Data","publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"inLanguage":"en-US"},{"@type":["Organization","NewsMediaOrganization"],"@id":"https:\/\/cryptoslate.com\/#organization","name":"CryptoSlate","url":"https:\/\/cryptoslate.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","width":1000,"height":1000,"caption":"CryptoSlate"},"image":{"@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/cryptoslate","https:\/\/www.instagram.com\/cryptoslate","https:\/\/www.linkedin.com\/company\/cryptoslate","https:\/\/www.youtube.com\/c\/cryptoslate","https:\/\/cryptoslate.substack.com","https:\/\/t.me\/cryptoslatenews","https:\/\/www.tiktok.com\/@cryptoslatenews"],"publishingPrinciples":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","ownershipFundingInfo":"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/","actionableFeedbackPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","correctionsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","ethicsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","foundingDate":"2017-08-04","founder":[{"@type":"Person","name":"Nate Whitehill"},{"@type":"Person","name":"Matthew Blancarte"}],"contactPoint":[{"@type":"ContactPoint","contactType":"customer support","url":"https:\/\/cryptoslate.com\/contact\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"sales","url":"https:\/\/cryptoslate.com\/advertising\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"newsroom","url":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","email":"tips@cryptoslate.com","availableLanguage":"en-US"}],"masthead":"https:\/\/cryptoslate.com\/about\/#masthead"},{"@type":"Person","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/ea2b02b41a7478e18d903ca8eec4979e","name":"Liam 'Akiba' Wright","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/10\/about-liam-150x150.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/10\/about-liam-150x150.jpg","caption":"Liam 'Akiba' Wright"},"description":"Also known as \"Akiba,\" Liam Wright is the Editor-in-Chief at CryptoSlate and host of the SlateCast. He believes that decentralized technology has the potential to make widespread positive change.","sameAs":["http:\/\/www.akiba.gg","https:\/\/twitter.com\/akibablade"],"url":"https:\/\/cryptoslate.com\/author\/liam-akiba-wright\/"}]}},"_links":{"self":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/496801"}],"collection":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/users\/1264"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/comments?post=496801"}],"version-history":[{"count":9,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/496801\/revisions"}],"predecessor-version":[{"id":496827,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/496801\/revisions\/496827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media\/496809"}],"wp:attachment":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media?parent=496801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/categories?post=496801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/tags?post=496801"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/post_folder?post=496801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}