Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/Threats/EtherRAT Targets Enterprise Admins with SEO Poison
Threats

EtherRAT Targets Enterprise Admins with SEO Poison

A newly identified, sophisticated malware campaign is actively targeting enterprise administrators, DevOps engineers, and security analysts. It achieves this by exploiting their common search habits...

David kimber
David kimber
May 1, 2026 4 Min Read
0 0

A newly identified, sophisticated malware campaign is actively targeting enterprise administrators, DevOps engineers, and security analysts. It achieves this by exploiting their common search habits through search engine optimization (SEO) poisoning.

Rather than using mass phishing or broad spam waves, threat actors behind this operation have carefully crafted a delivery chain that puts dangerous software directly in front of high-privilege IT professionals when they search for routine administrative tools online.

The campaign works by poisoning search engine results across multiple major platforms, including Bing, Yahoo, DuckDuckGo, and Yandex.

When IT staff search for tools like PsExec, AzCopy, Sysmon, LAPS, or KustoExplorer, the search results surface fake, professional-looking GitHub repositories at the top of the page.

These repositories appear clean and legitimate, containing no malicious code on their surface.

They act purely as a gateway, quietly redirecting unsuspecting users to a secondary, hidden GitHub account where the actual malware is hosted and distributed.

Atos analysts identified this sophisticated, high-resilience malicious campaign in March.

Researchers confirmed that the campaign remains highly active and has undergone significant technical maturation since its inception, with several distinct variants and additional command-and-control (C2) infrastructure identified over time.

The malware at the center of this campaign is a multi-stage, fileless-style Remote Access Trojan (RAT) written in JavaScript.

Atos researchers confirmed it to be EtherRAT, a recently emerging threat that uses the Ethereum blockchain to store its live C2 server address, effectively preventing traditional domain takedown or IP-blocking efforts.

The malware is distributed through malicious MSI installers disguised as tools like PsExec, AzCopy, Sysmon, LAPS, and KustoExplorer, which are almost exclusively used by personnel with elevated network and system permissions.

A successful infection on an administrator’s workstation can provide threat actors with the keys to an entire enterprise environment.

The psychological element of this campaign is particularly aggressive. Many of the impersonated tools are the same ones security professionals use to investigate and respond to malicious activity.

This creates an ironic situation where a defender, trying to diagnose a perceived issue using a tool like Process Explorer or TCPView, inadvertently introduces the very threat they were trying to find.

Dual-Stage GitHub Delivery Chain

The campaign uses a carefully separated, two-stage delivery architecture designed to stay alive even when parts of it are taken down.

The first GitHub repository serves only as a clean-looking facade. It is SEO-optimized and contains a professional README file with no malicious code, building initial trust with both users and security tools.

Embedded within that README is a link pointing to a second, hidden GitHub account. This secondary repository hosts the actual malicious MSI payload.

By separating the SEO-visible storefront from the payload delivery account, the threat actors can rapidly rotate their distribution repositories if flagged, while the primary search-indexed facade remains active and untouched.

Between early December 2024 and April 2026, the threat actors deployed 17 separate GitHub facades, each spoofing a different administrative or developer tool, indicating a sustained effort to maximize search engine visibility and capture a diverse range of high-privilege victims.

Malware Downloaded by User (Source - Atos)
Malware Downloaded by User (Source – Atos)

When a victim downloads and runs the MSI, four files are extracted and a CMD batch script is launched via a Custom Action at SYSTEM privilege immediately after file extraction.

The entry point is a heavily obfuscated Windows batch script launched at SYSTEM privilege by the MSI Custom Action immediately after file extraction.

Its primary obfuscation mechanism splits all sensitive command names, including curl, tar, copy, start, and cmd, across multiple SET variable assignments that are silently concatenated at runtime, ensuring no recognizable keywords appear in the raw file and defeating simple string-based static analysis.

Stage 2 is a minimal Node.js script, unobfuscated and fully readable, that is never saved to disk.

Stage 2 code (Source - Atos)
Stage 2 code (Source – Atos)

Its main goal is to read a file containing a second-stage encrypted payload, decrypt it using a hardcoded key and initialization vector (IV), and execute it in memory. It also creates persistence via a registry Run key.

Stage 3 RAT (Source - Atos)
Stage 3 RAT (Source – Atos)

Stage 3 is the malware’s main payload, a JavaScript file that runs silently in the background on every system boot inside conhost.exe, a legitimate Windows process, so it does not stand out in Task Manager.

Organizations can take the following steps to reduce the risk posed by this campaign:

  • Block access to the public Ethereum (ETH) RPC endpoints used by EtherRAT, listed in the Appendices section of the Atos TRC GitHub repository.
  • Review historical network logs to identify any outbound communications with the listed RPC ETH endpoints and identified historical C2 domains.
  • Increase awareness among IT personnel regarding the risks of sourcing critical utilities from search engine results; require use of verified internal software centers or direct, authenticated vendor portals for all administrative tools.
  • Look for behavioral patterns in telemetry: repeated, high-frequency beacons (every ~500ms) to suspicious external domains, periodic outbound requests (every ~5 minutes) to public ETH RPC endpoints, and suspicious process trees involving node.exe processes executing shell commands.
  • Treat any usage of conhost.exe with the headless argument as a potential indicator of the secondary stages of the EtherRAT payload.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

MalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

New Spyware Platform: Rebrand & Resell Android Lets Buyers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us