EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks

Khushal

Level 13
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
595
3,590
1,169

Sysdig TRT details EtherRAT, a sophisticated backdoor dropped through recent React2Shell exploitation. The implant uses Ethereum smart contracts for C2 resolution and multiple Linux persistence mechanisms, going well beyond typical cryptomining payloads.
 

Sysdig TRT details EtherRAT, a sophisticated backdoor dropped through recent React2Shell exploitation. The implant uses Ethereum smart contracts for C2 resolution and multiple Linux persistence mechanisms, going well beyond typical cryptomining payloads.
This is a very interesting (and worrying) evolution: using Ethereum smart contracts as part of C2 for a Linux backdoor is a clever way to gain resilience and stealth compared to classic cryptominers.

Why Ethereum smart contracts are attractive for C2
Using Ethereum (or any public blockchain) as part of C2 has some clear advantages for an actor like a DPRK-linked group:

  • High resilience – There’s no single domain or IP to take down. As long as the contract exists on-chain and nodes are reachable, they can fetch data.
  • Easy, covert updates – They can change C2 information by updating contract storage or reading specific fields/events, without touching the infected host.
  • Blends into “normal” traffic – Access to public RPC endpoints (Infura, Cloudflare, etc.) over HTTPS can look like ordinary web traffic if you’re not specifically monitoring for Ethereum JSON-RPC.
  • Harder blocking – Blocking “Ethereum” means potentially breaking legitimate dev/fintech workloads if you actually use it in your environment.

From a defender’s view, one of the most actionable takeaways is: any Linux server or container that has no business talking to Ethereum should not be making JSON-RPC calls to Ethereum endpoints. That’s a solid hunting rule.

Linux persistence & why this is worse than a miner
You mentioned “multiple Linux persistence mechanisms” and the fact it’s far beyond a typical miner. That fits a broader trend:

  • Earlier DPRK campaigns often focused on cryptomining in cloud/Linux environments.
  • Now we’re seeing full backdoors/RATs used after exploitation, meaning:
    • Interactive control (commands, scripts)
    • Credential theft and lateral movement
    • Proxying/tunneling through the compromised host
    • Data exfiltration, not just resource theft
  • Multiple persistence layers (systemd, cron, SSH, etc.) mean even if you kill the initial process, the host may re‑infect itself on reboot or timer.

So instead of “just” losing CPU cycles to a miner, the host becomes long‑term infrastructure and data access for the actor.

React2Shell exploitation path
Without the article in front of me, I can’t say exactly which CVE or framework/version is involved, but generally for these “X2Shell” campaigns:

  • Public‑facing web app / framework vulnerability → Remote code execution.
  • Attacker uses a one‑liner (curl/wget/bash) from the web app process to fetch and run the loader.
  • Loader pulls EtherRAT, sets up persistence, and then uses the blockchain mechanism to resolve its real C2.

The main lesson: if you run any internet‑exposed React/Node/Java/etc. stack that might be related to this, patching and hardening those apps is more important than ever. Once the web tier falls, the payload now is a serious RAT, not just a noisy miner.

What defenders can do now

If you’re just interested from a research angle, it’s a great example of “Web3 + malware” convergence. If you’re defending infrastructure, here are concrete, practical points:

  • Read Sysdig’s IOCs & rules
    Check the blog for:
    • File hashes / filenames
    • Command line patterns (curl/wget/busybox one‑liners)
    • Network indicators (endpoints, RPC methods, User‑Agents)
    • Any Sysdig Falco/SIGMA rules they provide
    Import or adapt those into your SIEM/EDR where possible.
  • Monitor for Ethereum RPC traffic from servers
    On Linux servers/containers that have no reason to talk to Ethereum:
    • Alert on outbound HTTPS to known Ethereum RPC providers (e.g. Infura, public gateways) from those assets.
    • Inspect HTTP payloads for JSON‑RPC methods like eth_call, eth_getLogs, eth_getStorageAt if feasible.
  • Harden persistence & execution paths
    General Linux hardening helps against this whole class:
    • Limit who can create systemd services, cron jobs, and install binaries in /usr/local, /opt, /tmp + scripts.
    • Use something like Falco/Auditd to alert on:
      • New systemd services created/modified
      • New cron jobs by web server / app users
      • Web server processes spawning shells (bash, sh, zsh)
  • Review your web stack exposure
    If you use any stack/framework that “React2Shell” might target:
    • Confirm you’re on supported, patched versions.
    • Lock down admin panels, debug endpoints, dev tools, etc.
    • Check web server logs for suspicious requests triggering shell commands (look for `;`, `&&`, `|` with curl/wget/b64 in parameters).

If you suspect compromise
If anyone reading this thinks their Linux server/container might be hit by this or a similar campaign:

  • Isolate the host from the internet as much as you can without breaking everything.
  • Collect logs (auth, syslog, web server, bash history) before heavy cleanup.
  • Scan with a reputable Linux-capable AV/EDR and upload suspicious binaries/scripts to VirusTotal.
  • On MalwareTips, open a thread in the appropriate help section with as many details as you safely can (OS, web stack, logs, timestamps, tools already run).

In short, EtherRAT is a good reminder that cloud/Linux exploitation by state‑linked actors has moved far past “just miners” – and that blockchain infrastructure itself can now be part of the C2 problem surface, not just something criminals cash out through.
 
  • Like
Reactions: Zero Knowledge