EtherRAT Campaign Spoofs Admin Tools via GitHub Facades

EtherRAT Campaign Spoofs Admin Tools via GitHub Facades

A new, highly resilient EtherRAT distribution campaign, identified by Atos Threat Research Center (TRC) in March 2026, is actively targeting high-privilege accounts. This operation specifically goes after enterprise administrators, DevOps engineers, and security analysts. The attackers are impersonating common administrative utilities these professionals rely on daily.

The Hacker News reports that the attackers are integrating Search Engine Optimization (SEO) tactics to push malicious GitHub repositories high in search results. These repositories masquerade as legitimate tools, but actually distribute EtherRAT. This is a classic social engineering play, but with a modern twist: leveraging trusted platforms like GitHub and search engines to deliver the payload. It’s an effective method because these targets often download and execute new tools as part of their job function.

The attacker’s calculus is clear: compromise a high-privilege account, gain maximum access. For defenders, this means assuming that any download from an untrusted source, even if it looks legitimate in search results, could be a trap. The reliance on GitHub for tool distribution by both legitimate developers and attackers makes this a persistent threat vector.

What This Means For You

  • If your team members (especially admins, DevOps, and security analysts) are downloading tools, verify the source. Don't just trust the first search result. Cross-reference official vendor sites. Implement application whitelisting and robust endpoint detection and response (EDR) to catch anomalous processes. Assume compromise if an admin downloads an unverified tool.

πŸ›‘οΈ Detection Rules

3 rules Β· 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β€” export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

EtherRAT Campaign GitHub Repository Download

Sigma YAML β€” free preview

Source: Shimi's Cyber World Β· License & reuse

βœ“ Sigma Β· Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM β†’

Indicators of Compromise

IDTypeIndicator
EtherRAT-Distribution-Spoofing Malware Distribution EtherRAT malware distributed via GitHub facades
EtherRAT-Distribution-Spoofing Impersonation of administrative utilities to target enterprise administrators, DevOps engineers, and security analysts
EtherRAT-Distribution-Spoofing Attack Vector Search Engine Order (SEO) poisoning for malware distribution
Take action on this incident
πŸ“‘ Monitor atos.net Free Β· 1 watchlist slot Β· instant alerts on new breaches πŸ” Threat intel on Atos Threat Research Center All breaches, IOCs & vendor exposure

Related coverage on Atos Threat Research Center

DEEP#DOOR Python Backdoor Disables Security Controls for Credential Theft

The Hacker News reports on DEEP#DOOR, a new Python-based backdoor framework that can disable Windows security features to gain persistent access and steal sensitive data....

threat-intelvulnerabilitymalwarecloudmicrosoftidentitytools
/SCW Vulnerability Desk /HIGH /⚑ 5 IOCs

EnOcean SmartServer Vulnerabilities Enable Building System Hacking

Claroty researchers have identified two critical vulnerabilities in EnOcean's SmartServer, a device used to manage building automation systems. Exploitation could allow attackers to bypass security...

threat-intelvulnerabilitycloud
/SCW Vulnerability Desk /MEDIUM /⚑ 1 IOC /⚙ 3 Sigma

cPanel & WHM Zero-Day Exploited for Months, Granting Admin Access

A critical authentication bypass vulnerability in cPanel & WHM has been actively exploited as a zero-day for months, according to SecurityWeek. This flaw allows attackers...

threat-intelvulnerabilityidentity
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs /⚙ 3 Sigma