Skip to content

EtherRAT and EtherHiding: Hackers Hide Malware on Ethereum Smart Contracts

Hacker with Ethereum and malware symbols. Hackers Weaponize Ethereum Blockchain to Hide Malware with EtherRAT and EtherHiding

EtherRAT and EtherHiding: Security researchers have uncovered a very complex and sophisticated malware campaign that hides its command infrastructure inside the Ethereum blockchain. The backdoor (Node.js-based), dubbed EtherRAT, retrieves its command and control server (C2) addresses from an immutable smart contract (using a mechanism known as Etherhiding). This means defenders cannot just block or take down the control server the way they could with a conventional domain.

How EtherRAT and EtherHiding Operate?

The EtherRAT malware launches its commands through an executable file created using Node.js while checking multiple public Ethereum Remote Procedure Call (RPC) providers to identify the most often referenced C2 address stored within the smart contract. By using the ‘setString’ function of the contract, the attacker can update the valid address instantaneously and at very little cost, providing the ability for infected hosts to communicate with newly updated infrastructure without having to reinstall or redeploy the malware itself.

Hackers Weaponize Ethereum Blockchain to Hide Malware with EtherRAT and EtherHiding: North Korean-linked attackers store command addresses in immutable smart contracts, making takedown nearly impossible.
Retrieve C2 via EtherHiding. (Source: eSentire)

To avoid detection, EtherRAT generates beacon Uniform Resource Locators (URLs), the sites where the infected hosts connect with the C2, that appear as if they were created by legitimate Content Delivery Network (CDN) requests, including a random hexadecimal paths, Universally Unique Identifiers (UUIDs) and common file types such as .ICO and .PNG. EtherRAT also sends its own code back to the C2, returning a newly scrambled version, effectively rewriting itself on the go, thus bypassing signature‑based defenses.

Hackers Weaponize Ethereum Blockchain to Hide Malware with EtherRAT and EtherHiding: North Korean-linked attackers store command addresses in immutable smart contracts, making takedown nearly impossible.
Beacon via CDN-like URL and Get Code to Execute from C2. (Source: eSentire)

Initial Access and Targeting

EtherRAT was first identified by researchers at eSentire within a retail environment in March 2026. Initial access was gained by either using ClickFix (a sophisticated social engineering technique) attack via pcalua.exe to stealthily execute a malicious HTML Application (HTA) script, or by impersonating IT support via Microsoft Teams, and using QuickAssist to gain control of the victim’s machine. Both of these methods rely on deceiving a user, meaning that even if systems are fully patched, they are still vulnerable.

EtherRAT also looks for language patterns associated with the Commonwealth of Independent States (CIS) region, or languages (such as Russian, Belarusian, Kazakh, and so forth) and is designed to self-destruct if it’s detected, which is a North Korean pattern attribution.

Hackers Weaponize Ethereum Blockchain to Hide Malware with EtherRAT and EtherHiding: North Korean-linked attackers store command addresses in immutable smart contracts, making takedown nearly impossible.
Language check (Source: eSentire)

Next, the malware will obtain extensive system information, such as Central Processing Units (CPUs),  Graphics Processing Units (GPUs), installed antivirus (AV), domain names/details, and hardware IDs, and pass that information back to the C2.

Hackers Weaponize Ethereum Blockchain to Hide Malware with EtherRAT and EtherHiding: North Korean-linked attackers store command addresses in immutable smart contracts, making takedown nearly impossible.
System information collected in the attack. (Source: eSentire)

Why This Matters

EtherRAT and EtherHiding are the new wave of malware resiliency. Stores the C2 infrastructure on an open, immutable blockchain, and makes it virtually impossible for the defenders to interrupt command channels via traditional takedowns. This has been seen in many different fields and will continue to be used by more threat groups to come. 

Final Take

To this point, the use of Ethereum as a C2 layer shows the blockchain immutability that has been long viewed as a benefit, can also be weaponized against defenders. This means, organizations now must implement blocking of public RPC providers, disable the unused Windows components like mshta.exe and pcalua.exe, and provide user awareness training to aid in IT support scams, are no longer just good practices, but absolutely necessary defenses against the newest generations of persistent sophisticated threats.

Disclaimer: All content provided on Times Crypto is for informational purposes only and does not constitute financial or trading advice. Trading and investing involve risk and may result in financial loss. We strongly recommend consulting a licensed financial advisor before making any investment decisions.

A Web3 Journalist at TimesCrypto with a knack for turning complex ideas into engaging stories. With a solid Tech background, Alan has led teams to create and refine impactful projects across industries, working in firms such as IBM, Cisco Systems, and Telecom. He’s passionate about Blockchain, Finance, Science, bringing a unique blend of technical expertise and creative flair to every piece he writes. When he’s not crafting content, you’ll find him diving deep into research or just having some fun!

Zoomable Image