A sophisticated scheme discovered by the Atos threat investigation team in March 2026 shows how malicious actors are going on the offensive against high-privilege accounts through a combination of classic techniques and modern resilience resources: SEO poisoning, a two-phase distribution architecture in GitHub and a command and control resolution (C2) anchored in the public block chain. The goal is not the average user: they deliberately seek out administrators, DevOps engineers and security analysts through MSI installers who pose for legitimate administrative utilities.
The campaign exploits the confidence implicit in the search results. Through SEO poisoning, the attackers make facade repositories in GitHub - clean, with professional and well indexed README - appear in the first places for specialized tool searches. These repositories act as windows and discreetly redirect the user to a second hidden repository that houses the actual installer. Separating the public visibility of the payload delivery allows to rotate the distribution infrastructure without losing positioning in search engines This makes mitigation actions only based on account closures or disposal of repositories difficult.

Technically, the identified installers are MSI that fire an ofuscated batch script, download the Node.js runtime from their official channel and deploy a multi-channel JavaScript payload chain encrypted with AES-256-CBC. The persistence is achieved by means of Run keys of the registry with random names, and the malicious process runs within legitimate processes (e.g. conhost.exe with parameters that attempt to hide it). The final behavior is that of a RAT in memory capable of rewriting itself and running remote code dynamically., which complicates detection by static signatures.
The component that gives real strategic value to this operation is C2 resolution by smart contracts in Etheum: the malware publicly consults several RPC endpoints from Etheum to read the value stored in a contract and so get the URL of the command server. By updating that single data in the chain, the adversary redirects all infections without touching the binaries deployed. This turns the lockchain into a public, highly available and block-resistant dead-drop by domain or IP. To understand the underlying technical mechanism, the documentation on nodes and Etheum customers can be consulted at ethereum.org.
The operational implications are serious: by targeting tools that only use users with high permissions, each infection has a high probability of becoming "kingdom keys" within an organization. In addition, the campaign prioritizes patience and stealth - post-manual exploitation, silent recognition and measured lateral movements - which increases the risk of prolonged access and directed exfiltration.
Detecting this threat requires looking beyond static indicators. Useful telemetrics include the emergence of node.exe processes that run system commands, conhost.exe released with unusual arguments such as "--headless," regular writings in local trace files (e.g. svchost.log in% APPDATA%), and outgoing traffic to Ethedium public RPC services. Reviewing egress histories and DNS / HTTP records to public RPC gateways is critical for discovering past infections.
As for practical mitigation, it is appropriate to apply egress controls to block or inspect access to public RPC gateways used to consult Etherium, implement enabling policies for software downloads at administrative stations, and centralize software sources in verified internal catalogues or supplier portals. The dynamic download of Node.js from its official website by the malicious installer underlines the need to restrict which systems can freely access the Internet to recover external runtimes; for example, the official site of Node.js is nodejs.org but its use must be subject to control and monitoring within the corporate perimeter.
It is also recommended to strengthen administrative access with network segmentation, minimum privileges, solid multifactor authentication and frequent rotation of credentials. Since detection, EDR rules should look for patterns such as repeated and periodic executions (every ~ 5 minutes) to unusual endpoints, parent-child anomalies where node.exe invokes shells, and the presence of Run keys with randomly generated names. Do not delegate critical tool verification to a simple search result: encourage the use of signed and verified internal repositories.

In response and coordination, defensive teams should combine technical actions with suppliers and platforms (e.g., request the removal of malicious repositories in GitHub) and work with CSIRTs and authorities to pursue infrastructure as far as possible. However, it must be recognized that the decentralized nature of the C2 vector limits the effectiveness of traditional countermeasures and requires defensive measures in layers.
On attribution, there are reports of technical overlap between this "EtherHering" module and previous work linked by different teams to state actors. However, reuse of code and techniques between groups is common; technical evidence alone should not lead to hasty attribution conclusions without a broad set of corroborations.
Finally, the defensive community should consider this case as a reminder that the human supply chain begins in search engines and ends in the machine with privileges. Adopt telemetry controls, restrict egress to unsupervised decentralized infrastructure and train administrative staff to verify the source of the software are urgent actions. To better understand security measures in the software supply chain and collaborate in mitigation, GitHub's guide to supply chain security is a good starting point: GitHub supply chain security guide. In environments where there are doubts about historical communications, a forensic analysis of the log and collaboration with teams such as CSIRT and managed security providers will be key to containing and eradicating this threat.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...