EtherRAT campaign targets enterprise admins through fake GitHub tool pages


A new EtherRAT malware campaign is targeting enterprise administrators, DevOps engineers, and security analysts by abusing the way they search for trusted administrative tools online.

The campaign uses SEO poisoning to push fake GitHub repositories into search results for tools such as PsExec, AzCopy, Sysmon, Windows LAPS, Kusto Explorer, Process Explorer, TCPView, ProcDump, BgInfo, and other utilities used by IT teams.

Researchers found that the attackers use clean-looking GitHub pages as a first step. These pages do not host malware directly. Instead, they send users to a second GitHub repository that delivers a malicious MSI installer.

How the EtherRAT campaign works

The attack starts when an IT worker searches for a common admin or troubleshooting tool on search engines such as Bing, Yahoo, DuckDuckGo, or Yandex. The poisoned results can lead to a GitHub repository that looks like a legitimate download page.

The first repository acts as a facade. It usually includes a professional-looking README file and may appear safe because it does not contain obvious malicious code.

The danger begins when the user follows the download link. That link points to another GitHub account or repository where the malicious MSI file is hosted. Once the installer runs, the infection chain starts on the victim’s system.

Why enterprise admins are the main target

This campaign is dangerous because it focuses on users with elevated access. Tools such as PsExec, Sysmon, LAPS, RSAT, WinDbg, AzCopy, and Kusto Explorer are usually searched for by system administrators, security teams, cloud engineers, and enterprise support staff.

Malware Downloaded by User (Source – Atos)

If attackers compromise one of those machines, they may gain a strong foothold inside a company network. An admin workstation can hold credentials, management tools, VPN access, cloud permissions, and internal documentation.

This makes the campaign more targeted than a typical malware operation. Instead of trying to infect as many random users as possible, the attackers try to reach the people who already manage sensitive infrastructure.

At a glance

CategoryDetails
MalwareEtherRAT
Main delivery methodSEO-poisoned GitHub repositories
Targeted usersEnterprise admins, DevOps engineers, security analysts, and IT support teams
Fake tools used as luresPsExec, AzCopy, Sysmon, LAPS, Kusto Explorer, Process Explorer, TCPView, ProcDump, and others
Payload formatMalicious MSI installers
Command-and-control methodEthereum smart contracts and public Ethereum RPC endpoints
Main riskRemote access, persistence, data theft, and deeper enterprise compromise

GitHub facades help the campaign survive takedowns

The two-stage GitHub setup gives the attackers more resilience. If defenders report or remove the second repository that hosts the payload, the attackers can update the link in the first repository and keep the search-visible page alive.

Atos researchers identified dozens of malicious GitHub facades connected to this operation. The fake repositories impersonated tools across several categories, including Sysinternals utilities, Active Directory tools, remote access software, cloud transfer tools, debugging tools, and business utilities.

This approach also gives the operation a trust advantage. Many IT professionals already use GitHub to find scripts, documentation, tools, and open-source projects, so a polished GitHub page can lower suspicion during a busy troubleshooting session.

How the malware runs after installation

After the victim launches the MSI installer, the package extracts several files and starts a Windows command script through an MSI Custom Action. The script runs with high privileges and prepares the next stage of the attack.

Stage 2 code (Source – Atos)

The malware then uses Node.js and JavaScript-based stages to decrypt and execute additional code. Some payloads run in memory, which reduces the number of obvious files security tools can inspect.

Later stages create persistence through the Windows registry and run the main RAT payload through conhost.exe with a headless argument. This helps the process look less suspicious in normal system views.

Ethereum-based C2 makes blocking harder

EtherRAT does not rely only on a fixed command-and-control domain. Instead, it queries Ethereum smart contracts through public Ethereum RPC services to find the current C2 server address.

This matters because defenders cannot fully disrupt the campaign by blocking a single domain or taking down one server. The attacker can update the value stored in the smart contract, and the malware can retrieve the new C2 location during its next lookup cycle.

Stage 3 RAT (Source – Atos)

Researchers also observed periodic communication with public Ethereum RPC endpoints, high-frequency beaconing, and suspicious process behavior involving node.exe and conhost.exe. These patterns can help defenders build detection rules.

Why this campaign is hard to spot

  • The first GitHub repository can look clean and harmless.
  • The malware hides behind trusted administrative tool names.
  • The payload uses multiple stages instead of one obvious executable.
  • Some JavaScript stages run in memory.
  • The C2 address can change through blockchain-based resolution.
  • The campaign targets tools that technical users already expect to download.

What IT teams should do now

Organizations should stop relying on search results for administrative software downloads. Internal software portals, vendor download pages, package allowlists, and signed installer verification should become the default for admin tools.

Security teams should also review historical network logs for outbound traffic to Ethereum RPC endpoints and known EtherRAT C2 infrastructure. This can help identify older infections that may still have persistence on admin workstations.

Endpoint teams should hunt for node.exe launching unusual scripts, MSI installers spawning command shells, conhost.exe running with headless arguments, suspicious registry Run keys, and high-frequency outbound beaconing to unknown infrastructure.

AreaWhat to check
DownloadsLook for MSI installers downloaded from unofficial GitHub repositories.
ProcessesReview node.exe, msiexec.exe, cmd.exe, PowerShell, and conhost.exe process trees.
PersistenceCheck registry Run keys for random names or Node.js execution paths.
NetworkLook for repeated calls to Ethereum RPC services and unknown C2 domains.
Admin toolsConfirm that tools such as PsExec, Sysmon, LAPS, RSAT, and Kusto Explorer came from official sources.

FAQ

What is EtherRAT?

EtherRAT is a JavaScript-based remote access trojan that can execute attacker-supplied commands, collect system details, and maintain communication with a command-and-control server.

Why does EtherRAT use Ethereum?

EtherRAT uses Ethereum smart contracts to store or retrieve the current C2 address. This gives attackers a flexible way to change infrastructure without rebuilding the malware.

Are GitHub repositories always risky?

No. GitHub itself is a legitimate developer platform. The risk comes from attackers abusing GitHub pages and repositories to impersonate trusted tools and distribute malicious installers.

How can admins avoid this attack?

Admins should download tools only from official vendor pages, internal software catalogs, trusted package managers, or verified repositories. They should avoid search-result downloads for sensitive administrative utilities.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages