Cybercriminal group GrayCharlie exploits WordPress sites to deploy NetSupport RAT and Stealc malware. Stay vigilant and secure your systems. #CyberSecurity #Malware #WordPress #NetSupportRAT #Stealc Link: thedailytechfeed.com/graycharlie-...
Latest posts tagged with #NetSupportRAT on Bluesky
Cybercriminal group GrayCharlie exploits WordPress sites to deploy NetSupport RAT and Stealc malware. Stay vigilant and secure your systems. #CyberSecurity #Malware #WordPress #NetSupportRAT #Stealc Link: thedailytechfeed.com/graycharlie-...
Cyber threat group Bloody Wolf escalates attacks in Uzbekistan and Russia using NetSupport RAT. Over 60 targets affected, highlighting the need for enhanced cybersecurity measures. #CyberSecurity #ThreatIntel #NetSupportRAT Link: thedailytechfeed.com/bloody-wolf-...
Bloody Wolf Uses NetSupport RAT in Attacks
Read More: buff.ly/lEfPAah
#BloodyWolf #StanGhouls #NetSupportRAT #SpearPhishing #CyberEspionage #ThreatIntel #MalwareCampaign #Infosec
~Sekoia~
IClickFix framework compromises thousands of WordPress sites, using a 'ClickFix' lure to deliver NetSupport RAT.
-
IOCs: 85. 208. 84. 35, 141. 98. 11. 175, 83. 222. 190. 174
-
#IClickFix #NetSupportRAT #ThreatIntel #WordPress
Il tuo sito WordPress non è una vetrina: è già una botnet (GrayCharlie docet)
📌 Link all'articolo : www.redhotcyber.com/post/il-...
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #netsupportrat #wordpress #javascript
Example of initial URL from sites.google[.]com.
Example of a fake CAPTCHA page with ClickFix-style instructions and the ClickFix script.
Traffic from the infection filtered in Wireshark.
NetSupport RAT persistent on an infected Windows host.
2025-12-29 (Monday): #ClickFix page leads to #NetSupportRAT infection.
Details at www.malware-traffic-analysis.net/2025/12/29/i...
NetSupport RAT: il malware invisibile che gli antivirus non possono fermare
📌 Link all'articolo : www.redhotcyber.com/post/net...
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #netSupportRAT #javascript
New multi-stage malware attack delivers NetSupport RAT via obfuscated scripts, granting full system control. Stay vigilant! #CyberSecurity #Malware #NetSupportRAT #InfoSec Link: thedailytechfeed.com/sophisticate...
Alert: The JS#SMUGGLER campaign is exploiting compromised websites to deploy NetSupport RAT, granting attackers full control over infected systems. Stay vigilant! #CyberSecurity #Malware #NetSupportRAT Link: thedailytechfeed.com/cybercrimina...
JS#SMUGGLER usa iframes invisibili, HTA fileless e PowerShell cifrato per installare NetSupport RAT con una catena multi-stage estremamente furtiva.
#JS#SMUGGLER #NetSupportRAT
www.matricedigitale.it/2025/12/09/j...
Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT reconbee.com/experts-conf...
#JSSMUGGLER #NetSupportRAT #remoteaccesstrojan #RAT #cybersecurity #cyberattack
New JS#SMUGGLER malware campaign delivers #NetSupportRAT through compromised websites – hackers get full remote control of Windows machines.
Read: hackread.com/jssmuggler-n...
#JSsmuggler #Malware #Cybersecurity #Windows
Beware of the EVALUSION campaign using ClickFix tactics to deploy Amatera Stealer and NetSupport RAT. Stay vigilant against deceptive prompts! #CyberSecurity #MalwareAlert #ClickFix #AmateraStealer #NetSupportRAT Link: thedailytechfeed.com/evalusion-ca...
Beware of the evolving SmartApeSG campaign using the ClickFix technique to deploy NetSupport RAT via fake CAPTCHA prompts. Stay vigilant and educate users on these deceptive tactics. #CyberSecurity #ClickFix #NetSupportRAT Link: thedailytechfeed.com/smartapesg-u...
2025-09-22 (Monday) #SmartApeSG campaign using #FileFix style #ClickFix technique on its fake CAPTCHA page for #NetSupportRAT. Script sent to victim through #clipboardhijacking downloads MSI from founderevo[.]com/res/velvet when pasted into a File Manager window (www.virustotal.com/gui/file/958...)
6/ TAG-150 also deploys other malware families, including #SectopRAT, #WarmCookie, #HijackLoader, and #NetSupportRAT, as well as numerous stealers: #Stealc, #RedLine, #Rhadamanthys, #DeerStealer, #MonsterV2, and more.
Fake CAPTHA page generated by SmartApeSG script injected into compromised website.
ClickFix instructions from the fake CAPTCHA page.
Traffic from the infection filtered in Wireshark.
Script and traffic to download and run MSI file to install NetSupport RAT
2025-08-20 (Wed): #SmartApeSG for fake #CAPTCHA page with #ClickFix instructions that led to an MSI file for #NetSupport #RAT and the #NetSupportRAT infection led to #StealCv2. Malware samples, a #pcap, and indicators at www.malware-traffic-analysis.net/2025/08/20/i...
2025-07-22 (Tuesday): Tracking the #SmartApeSG campaign using #ClickFix to push #NetSupportRAT. Details at: github.com/malware-traf...
2025-07-17 (Thursday): Tracking the #SmartApeSG campaign for #ClickFix pages pushing #NetSupportRAT. Details at github.com/malware-traf...
2025-07-15 (Tuesday): Some different IOCs from the #SmartApeSG #ClickFix page today.
warpdrive[.]top <-- domain used for SmartAgeSG injected script and to display ClickFix page.
sos-atlanta[.]com <-- domain from script injected into clipboard and to retrieve #NetSupportRAT malware package
Screenshot of ClickFix-style fake verification page with text for the script injected into the viewer's hijacked clipboard.
HTTPS URLs seen during this infection chain.
Traffic from an infection filtered in Wireshark.
NetSupport RAT persistent on an infected Windows host through a Windows registry update.
2025-07-14 (Monday): #SmartApeSG script injected into page from compromised website leads to #ClickFix style fake verification page. ClickFix-ing you way through this leads to a #NetSupportRAT infection.
Potatocriminals exploit compromised WordPress sites using the ClickFix technique to deploy NetSupport RAT, granting unauthorized remote access. Stay vigilant! #PotatoSecurity #NetSupportRAT #ClickFix Link: thedailytechfeed.com/potatocrimina...
Cybercriminals exploit compromised WordPress sites using the ClickFix technique to deploy NetSupport RAT, granting unauthorized remote access. Stay vigilant! #CyberSecurity #NetSupportRAT #ClickFix Link: thedailytechfeed.com/cybercrimina...
Injected SmartApeSG script in page from legitimate but compromised website. This injected script leads to the ClickFix page.
Example of the ClickFix page and script injected into a victim's clipboard (clipboard hijacking) that the victim is asked to paste into Run window and run.
URL sequence for the ClickFix page and the URLs for NetSupport RAT.
Traffic from the infection filtered in Wireshark, showing the NetSupport RAT C2 traffic.
2025-06-27 (Friday): #SmartApeSG script for #ClickFix page leads to #NetSupport #RAT
Details at: github.com/malware-traf...
#NetSupportRAT #ClipboardHijacking
HTML source of page from legitimate but compromised site showing SmartApeSG injected script.
Example of a ClickFix-style page caused by the injected SmartApeSG script. A victim must click to get the popup and follow the instructions to paste and run the malicious script.
Traffic from an infection filtered in Wireshark. This shows the NetSupport RAT C2 traffic and StealC v2 traffic.
2025-06-18 (Wed): #SmartApeSG --> #ClickFix lure --> #NetSupportRAT --> #StealCv2
A #pcap of the traffic, the malware/artifacts, and some IOCs are available at www.malware-traffic-analysis.net/2025/06/18/i....
Today's the 12th anniversary of my blog, so I made this post a bit more old school.
Cybercriminals are using fake DocuSign and GitCode sites to deploy NetSupport RAT via multi-stage PowerShell attacks. Stay vigilant and verify sources before executing scripts. #CyberSecurity #Phishing #NetSupportRAT Link: thedailytechfeed.com/cybercrimina...
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack reconbee.com/fake-docusig...
#Docusign #gitcode #NetsupportRAT #powershellattack #cyberattack #cybersecurity #RAT
Post I wrote for my employer on other social media:
2025-02-18 (Tues): Legit but compromised websites with injected script for #SmartApeSG lead to a fake browser update for #NetSupportRAT malware. During an infection run, we saw follow-up malware for #StealC. Details at github.com/PaloAltoNetw...
Screenshot of the browser window for fake update page after visiting a compromised website.
Example of SmartApeSG injected script highlighted in orange in HTML code from a page from the compromised site.
Traffic from an infection filtered in Wireshark showing the NetSupport RAT post-infection traffic to 194.180.191[.]64 over TCP port 443
The NetSupport RAT installation persistent on an infected Windows host. Shows the Windows registry entry for persistence and the associated NetSupport RAT files.
2024-12-17 (Tues): #SmartApeSG injected script leads to fake browser update page that leads to #NetSupport #RAT infection. A #pcap of the infection traffic, associated malware samples and more information is available at www.malware-traffic-analysis.net/2024/12/17/i...
#FakeUpdates #NetSupportRAT