Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Alex Lab hack reportedly hits SPD Bank clients after earlier $8.3M exploit

May 3, 2026

Bitcoin's 'hazardous' airdrop: Why developers are warning against Paul Sztorc’s eCash fork

May 3, 2026

KelpDAO commits 2,000 ETH to DeFi united recovery fund for rsETH restoration

May 3, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts
EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts
Security

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

March 26, 2026No Comments2 Mins Read

A new EtherRAT malware campaign using Ethereum smart contracts to hide command-and-control (C2) infrastructure has been identified by researchers.

According to a new advisory published by eSentire on March 25, the activity was observed during a March 2026 incident response investigation in the retail sector, where adversaries deployed a Node.js‑based backdoor after gaining initial access.

The researchers found the malware enables attackers to execute commands remotely, collect extensive system data and steal cryptocurrency wallets and cloud credentials.

The most notable development is the use of a technique known as EtherHiding, which stores C2 addresses inside Ethereum smart contracts, allowing operators to rotate infrastructure cheaply and avoid traditional takedown efforts.

Ethereum Smart Contracts Used For Command Infrastructure

Investigators observed several methods used to gain initial access, including ClickFix attacks and IT support scams conducted over Microsoft Teams, followed by QuickAssist remote access.

In the ClickFix case, attackers used indirect command execution to launch a malicious script through Windows utilities, bypassing security restrictions.

The infection chain involved multiple stages, including encrypted payloads and obfuscated scripts that ultimately deployed EtherRAT and established persistence through Windows registry keys.

Once installed, EtherRAT retrieved C2 addresses from Ethereum blockchain smart contracts via public RPC providers. The malware then communicated with the server using traffic designed to resemble normal content delivery network requests, helping it blend into legitimate network activity.

Read more on Ethereum smart contracts and malware infrastructure: Malicious npm Packages Exploit Ethereum Smart Contracts

eSentire said attackers could update C2 addresses by writing new data to the smart contract, allowing previously infected machines to reconnect to new servers with minimal cost.

See also  Litecoin says its 13-block reorg was not a 'zero-day, but GitHub commit history shows otherwise

System Fingerprinting and Data Collection

After connecting to its command server, the malware deployed a module that collected detailed system information used for target profiling. This includes:

  • Public IP address

  • CPU and GPU information

  • Operating system and hardware identifiers

  • Antivirus software details

  • Domain and administrator status

The malware also checked system language settings and deleted itself if certain CIS (Commonwealth of Independent States) region languages were detected.

The report concluded that organizations should disable certain Windows utilities, train employees to recognize IT support scams and consider blocking cryptocurrency RPC providers commonly used by attackers.

Source link

bypass Contracts Ethereum EtherRAT Security smart Techniques

Related Posts

Alex Lab hack reportedly hits SPD Bank clients after earlier $8.3M exploit

May 3, 2026

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Top Posts

How a Wallet Compromise Killed the Solana DeFi Aggregator

March 1, 2026

SEC Testifies on Clear Crypto Oversight, Signaling Major Regulatory Breakthrough for Digital Assets

February 13, 2026

Private Credit Bank Run Begins: Blue Owl Gates After Shocking 41% Of OTIC Investors Ask For Their Money

April 2, 2026

Type above and press Enter to search. Press Esc to cancel.