DEV Community

Mark0
Mark0

Posted on

Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

In April, a sophisticated cyber intrusion was identified involving the deployment of EtherRAT via a malicious MSI installer masquerading as a Sysinternals tool. This campaign utilized the Ethereum blockchain through EtherHiding to dynamically update command-and-control (C2) configurations, effectively bypassing traditional network defenses. The attackers further deployed TukTuk, an AI-generated malware framework that leverages an array of SaaS platforms including ClickHouse, Supabase, and Arweave for resilient communication and dead-drop resolution.

Following initial access, the threat actor engaged in extensive lateral movement using GoTo Resolve RMM and tools like NetExec. Sensitive data was exfiltrated to Wasabi cloud storage using Rclone before the intrusion culminated in the environment-wide deployment of The Gentleman ransomware via Group Policy Objects (GPO). The incident underscores a trend of threat actors adopting decentralized infrastructure and legitimate SaaS tools to mask malicious activities and complicate attribution.


Read Full Article

Top comments (0)