Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EtherRAT Uses GitHub Facades to Target Admin Accounts

EtherRAT Uses GitHub Facades to Target Admin Accounts

Posted on April 30, 2026 By CWS

Introduction

In March 2026, the Atos Threat Research Center (TRC) uncovered a sophisticated cyber campaign leveraging GitHub facades to target high-privilege enterprise accounts. This operation primarily aims at administrators, DevOps engineers, and security analysts, using advanced techniques such as SEO poisoning and decentralized command-and-control (C2) architectures. The campaign’s resilience and adaptability make it a formidable threat in the cybersecurity landscape.

Creative Distribution via GitHub Facades

The campaign employs a complex distribution strategy to avoid detection and takedowns. By using SEO poisoning, it ensures that malicious results appear prominently in search engines like Bing and Yahoo. Potential victims are directed to a primary GitHub repository that looks legitimate but contains no harmful code. Instead, it features a professional README file with a link to a secondary, hidden repository where the actual malware is hosted. This separation allows the threat actors to maintain their search engine presence while quickly rotating the malicious repositories if flagged.

Targeted Impersonation of Administrative Tools

Adversaries impersonate essential administrative tools to profile and compromise high-privilege users. These fake tools, such as PsExec and Sysmon, are used by individuals with elevated permissions. Once installed, the malware provides attackers with extensive access, potentially enabling lateral movement within the organization. This strategic impersonation capitalizes on the trust placed in familiar utilities to infiltrate enterprise environments.

Decentralized C2 via Ethereum Blockchain

One of the most innovative aspects of this campaign is its use of Ethereum blockchain for C2 communication. Instead of relying on static IP addresses or domains, which are susceptible to blocklisting, the malware queries a smart contract on the Ethereum blockchain. This method allows the dynamic retrieval of live C2 server addresses, offering the adversaries remarkable resilience. The ability to modify server locations via blockchain transactions ensures continuous and uninterrupted control over infected systems.

Conclusion

The EtherRAT campaign represents a significant threat due to its innovative use of GitHub facades and blockchain technology. By targeting high-privilege accounts and employing decentralized C2 infrastructure, the attackers enhance their ability to remain undetected and operational. Organizations must stay vigilant and implement robust security measures to defend against such advanced threats. Continuous monitoring and education of IT personnel are essential to mitigate the risks associated with this campaign.

The Hacker News Tags:admin tools, Atos TRC, Blockchain, command-and-control, Cybersecurity, decentralized infrastructure, DevOps, enterprise security, EtherRAT, GitHub, lateral movement, Malware, SEO poisoning, Threat Actors

Post navigation

Previous Post: Critical Google Gemini CLI Flaw Exposes Systems to Attack
Next Post: SonicWall Urges Fast Action on Firewall Security Flaws

Related Posts

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms The Hacker News
Malicious Chrome Extensions Threaten Business Security Malicious Chrome Extensions Threaten Business Security The Hacker News
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools The Hacker News
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws
  • SonicWall Urges Fast Action on Firewall Security Flaws
  • EtherRAT Uses GitHub Facades to Target Admin Accounts
  • Critical Google Gemini CLI Flaw Exposes Systems to Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Supply Chain Attack Hits SAP NPM Packages
  • Urgent Updates for Jenkins Plugins Fix Critical Flaws
  • SonicWall Urges Fast Action on Firewall Security Flaws
  • EtherRAT Uses GitHub Facades to Target Admin Accounts
  • Critical Google Gemini CLI Flaw Exposes Systems to Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark