Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

March 27, 2026

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

March 27, 2026

OpenAI Expands Bug Bounty to Cover AI Abuse and ‘Safety’ Concerns

March 27, 2026
Facebook X (Twitter) Instagram
Friday, March 27
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts
Cyber Security

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

Team-CWDBy Team-CWDMarch 26, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new EtherRAT malware campaign using Ethereum smart contracts to hide command-and-control (C2) infrastructure has been identified by researchers.

According to a new advisory published by eSentire on March 25, the activity was observed during a March 2026 incident response investigation in the retail sector, where adversaries deployed a Node.js‑based backdoor after gaining initial access.

The researchers found the malware enables attackers to execute commands remotely, collect extensive system data and steal cryptocurrency wallets and cloud credentials.

The most notable development is the use of a technique known as EtherHiding, which stores C2 addresses inside Ethereum smart contracts, allowing operators to rotate infrastructure cheaply and avoid traditional takedown efforts.

Ethereum Smart Contracts Used For Command Infrastructure

Investigators observed several methods used to gain initial access, including ClickFix attacks and IT support scams conducted over Microsoft Teams, followed by QuickAssist remote access.

In the ClickFix case, attackers used indirect command execution to launch a malicious script through Windows utilities, bypassing security restrictions.

The infection chain involved multiple stages, including encrypted payloads and obfuscated scripts that ultimately deployed EtherRAT and established persistence through Windows registry keys.

Once installed, EtherRAT retrieved C2 addresses from Ethereum blockchain smart contracts via public RPC providers. The malware then communicated with the server using traffic designed to resemble normal content delivery network requests, helping it blend into legitimate network activity.

Read more on Ethereum smart contracts and malware infrastructure: Malicious npm Packages Exploit Ethereum Smart Contracts

eSentire said attackers could update C2 addresses by writing new data to the smart contract, allowing previously infected machines to reconnect to new servers with minimal cost.

System Fingerprinting and Data Collection

After connecting to its command server, the malware deployed a module that collected detailed system information used for target profiling. This includes:

  • Public IP address

  • CPU and GPU information

  • Operating system and hardware identifiers

  • Antivirus software details

  • Domain and administrator status

The malware also checked system language settings and deleted itself if certain CIS (Commonwealth of Independent States) region languages were detected.

The report concluded that organizations should disable certain Windows utilities, train employees to recognize IT support scams and consider blocking cryptocurrency RPC providers commonly used by attackers.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRapid Exploitation of CVE-2026-21962 Hits Oracle WebLogic
Next Article Claude Code Security and Magecart: Getting the Threat Model Right
Team-CWD
  • Website

Related Posts

Cyber Security

OpenAI Expands Bug Bounty to Cover AI Abuse and ‘Safety’ Concerns

March 27, 2026
Cyber Security

Rapid Exploitation of CVE-2026-21962 Hits Oracle WebLogic

March 26, 2026
Cyber Security

Hackers Exploit Compromised Enterprise Identities at Industrial Scale

March 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

What it takes to fool facial recognition

March 14, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.