EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
Briefly

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
"The campaign utilizes a multi-layered delivery chain designed to evade platform-level takedowns and maintain a high search engine ranking. The attack begins with SEO poisoning on various search engines, ensuring that malicious results for niche IT terms rank at the top of search results."
"By separating the SEO-optimized 'storefront' from the payload delivery account, the threat actors can rapidly rotate their distribution repositories if flagged, while the primary search-indexed facade remains active and untouched."
"The campaign is characterized by its focus on the administrative stack. By distributing malicious MSI installers disguised as tools like PsExec, AzCopy, Sysmon, LAPS, and Kusto Explorer, the adversary performs automated victim profiling."
In March 2026, a malicious campaign targeting enterprise administrators, DevOps engineers, and security analysts was identified. This operation employs SEO poisoning to rank malicious content high in search results, directing users to a facade GitHub repository. The facade contains no malware but links to a hidden repository that delivers the actual payload. The campaign focuses on impersonating administrative tools and utilizes MSI installers to profile victims, ensuring the threat actors can maintain operational flexibility and evade detection.
Read at The Hacker News
Unable to calculate read time
[
|
]