Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EtherRAT Uses GitHub Facades to Target Admin Accounts

EtherRAT Uses GitHub Facades to Target Admin Accounts

Posted on April 30, 2026 By CWS

Introduction

In March 2026, the Atos Threat Research Center (TRC) uncovered a sophisticated cyber campaign leveraging GitHub facades to target high-privilege enterprise accounts. This operation primarily aims at administrators, DevOps engineers, and security analysts, using advanced techniques such as SEO poisoning and decentralized command-and-control (C2) architectures. The campaign’s resilience and adaptability make it a formidable threat in the cybersecurity landscape.

Creative Distribution via GitHub Facades

The campaign employs a complex distribution strategy to avoid detection and takedowns. By using SEO poisoning, it ensures that malicious results appear prominently in search engines like Bing and Yahoo. Potential victims are directed to a primary GitHub repository that looks legitimate but contains no harmful code. Instead, it features a professional README file with a link to a secondary, hidden repository where the actual malware is hosted. This separation allows the threat actors to maintain their search engine presence while quickly rotating the malicious repositories if flagged.

Targeted Impersonation of Administrative Tools

Adversaries impersonate essential administrative tools to profile and compromise high-privilege users. These fake tools, such as PsExec and Sysmon, are used by individuals with elevated permissions. Once installed, the malware provides attackers with extensive access, potentially enabling lateral movement within the organization. This strategic impersonation capitalizes on the trust placed in familiar utilities to infiltrate enterprise environments.

Decentralized C2 via Ethereum Blockchain

One of the most innovative aspects of this campaign is its use of Ethereum blockchain for C2 communication. Instead of relying on static IP addresses or domains, which are susceptible to blocklisting, the malware queries a smart contract on the Ethereum blockchain. This method allows the dynamic retrieval of live C2 server addresses, offering the adversaries remarkable resilience. The ability to modify server locations via blockchain transactions ensures continuous and uninterrupted control over infected systems.

Conclusion

The EtherRAT campaign represents a significant threat due to its innovative use of GitHub facades and blockchain technology. By targeting high-privilege accounts and employing decentralized C2 infrastructure, the attackers enhance their ability to remain undetected and operational. Organizations must stay vigilant and implement robust security measures to defend against such advanced threats. Continuous monitoring and education of IT personnel are essential to mitigate the risks associated with this campaign.

The Hacker News Tags:admin tools, Atos TRC, Blockchain, command-and-control, Cybersecurity, decentralized infrastructure, DevOps, enterprise security, EtherRAT, GitHub, lateral movement, Malware, SEO poisoning, Threat Actors

Post navigation

Previous Post: Critical Google Gemini CLI Flaw Exposes Systems to Attack
Next Post: SonicWall Urges Fast Action on Firewall Security Flaws

Related Posts

China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 The Hacker News
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora The Hacker News
Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names The Hacker News
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain The Hacker News
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Supply Chain Attacks Target PyTorch Lightning for Credential Theft
  • Qilin Ransomware Exploits RDP History for Network Infiltration
  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws
  • SonicWall Urges Fast Action on Firewall Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Supply Chain Attacks Target PyTorch Lightning for Credential Theft
  • Qilin Ransomware Exploits RDP History for Network Infiltration
  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws
  • SonicWall Urges Fast Action on Firewall Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark