Security advisories

NetSupport RAT Clickfix Distribution

February 6, 2025 | 4 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

Beginning in early January 2025, eSentire Threat Response Unit (TRU) observed an increase in the number of incidents involving the NetSupport Remote Access Trojan (RAT). This activity remains common leading into early February. NetSupport RAT grants the attackers full control over the victim's host, allowing them to monitor the user's screen, control the keyboard and mouse, upload and download files, and launch and execute malicious commands. If left undetected, NetSupport RAT can lead to advanced threats, including ransomware attacks, compromising sensitive data, and disrupting business operations.

The eSentire Threat Intelligence team observed a notable spike in the use of NetSupport RAT in multiple recent incidents. This increase was observed in attacks that involved the emerging "ClickFix” Initial Access Vector (IAV), where end-users are socially engineered into copying and executing attacker-provided PowerShell commands (Refer to Figure.1).

As there is an ongoing NetSupport RAT campaign, organizations are recommended to validate their security controls and educate users on common initial access techniques, such as ClickFix.

What we’re doing about it

What you should do about it

Additional information

NetSupport RAT is a Remote Access Trojan (RAT) that is used by threat actors to gain control of the victim's host. It was originally developed as a remote IT support tool in 1989 and was known as NetSupport Manager but has been weaponized by cybercriminals in recent years. Threat actors, including TA569 and SmartApe SG (also referred to as ZPHP or HANEYMANEY), have been observed delivering the NetSupport Remote Access Trojan (RAT) to target organizations via fake browser update campaigns.

Once the malicious NetSupport client is installed on the victim's host, it enables real-time screen monitoring, full control of the user's screens, capture of screenshots, audio, and video, as well as bulk file upload and download. This gives threat actors the ability to perform data exfiltration and introduce additional malware payloads.

In January 2025, eSentire observed multiple incidents where ClickFix was used to deliver the NetSupport RAT. ClickFix is a technique used by threat actors to inject a fake CAPTCHA webpage on compromised websites, instructing users to follow certain steps to copy and execute malicious PowerShell commands on their host to download and run malware payloads.

In recently observed incidents, the NetSupport RAT payloads were often hosted on a URL that contained “.png” in the URL path. When the PowerShell command is executed by the user, it downloads the NetSupport RAT client (client32.exe) and its configuration file (client32.ini) on the host, which helps to establish Command-and-Control (C2) connections to the NetSupport RAT gateways. The NetSupport RAT C2 gateway URL often contains the string "fakeurl.htm" in its path.

Figure.1: ClickFix Fake Landing Page (Source: Any[.]Run)
Figure.1: ClickFix Fake Landing Page (Source: Any[.]Run)
Figure2: ClickFix led to Deployment of NetSupport RAT (Source: Any[.]Run)
Figure2: ClickFix led to Deployment of NetSupport RAT (Source: Any[.]Run)
Figure3: NetSupport RAT Payload Hosting and C2 (Source: VirusTotal)
Figure3: NetSupport RAT Payload Hosting and C2 (Source: VirusTotal)
Figure4: Content of the PowerShell script that downloads the NetSupport RAT components
Figure4: Content of the PowerShell script that downloads the NetSupport RAT components

Indicators of Compromise (IOCs)

Clickfix Pages

hxxp[://]eveverify[.]com/captcha[.]html

ClickFix FakeCAPTCHA page

eveverify[.]com

ClickFix FakeCAPTCHA domain

hxxp[://]findkik[.]com/Ray-verify[.]html

ClickFix FakeCAPTCHA page

findkik[.]com

ClickFix FakeCAPTCHA domain

hxxp[://]sapeconomico[.]com/captcha[.]html

ClickFix FakeCAPTCHA page

sapeconomico[.]com

ClickFix FakeCAPTCHA domain

hxxps[://]eiesoft.com/Ray-verify[.]html

ClickFix FakeCAPTCHA page

eiesoft[.]com

ClickFix FakeCAPTCHA domain

hxxps[://]lynxcm[.]com/Ray-verify[.]html

ClickFix FakeCAPTCHA page

lynxcm[.]com

ClickFix FakeCAPTCHA domain

NetSupport RAT

hxxp[://]mellittler[.]com/a/b[.]png

NetSupport RAT payload delivery

mellittler[.]com

NetSupport RAT payload delivery (Domain)

hxxp[://]hardcorelegends[.]com/a/b[.]png

NetSupport RAT payload delivery

hardcorelegends[.]com

NetSupport RAT payload delivery (Domain)

hxxp[://]fbinter[.]com/a/b[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/1[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/2[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/3[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/4[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/5[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/6[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/7[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/8[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/9[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/10[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/11[.]png

NetSupport RAT payload delivery

hxxp[://]fbinter[.]com/a/12[.]png

NetSupport RAT payload delivery

fbinter[.]com

NetSupport RAT payload delivery

hxxp[://]incomputersolutions[.]com/o/o[.]png

NetSupport RAT payload delivery (Domain)

incomputersolutions[.]com

NetSupport RAT payload delivery (Domain)

hxxp[://]92[.]255[.]85[.]135/fakeurl[.]htm

NetSupport RAT C2

92[.]255[.]85[.]135

NetSupport RAT C2

06A0A243811E9C4738A9D413597659CA8D07B00F640B74ADC9CB351C179B3268

NetSupportRAT file

16a178b33877f9c3219bbe1685bfb879b7c8ab8965dbc734fd49ecb02e8c9d01

NetSupportRAT file

References:

[1] https://www.esentire.com/security-advisories/lumma-stealer-clickfix-distribution
[2] https://www.esentire.com/what-we-do/threat-response-unit/threat-intelligence-services
[3] https://www.thewindowsclub.com/enable-or-disable-run-command-winr-box-in-windows-10
[4] https://www.esentire.com/blog/smartapesg-delivering-netsupport-rat
[5] https://any.run/report/0f055a3785c52067e413d057880cb4ef038bf209121fc6c44600c9b0fe7fdf54/5c16b4db-4b36-4039-a0ed-9b09abff8be2
[6] https://www.virustotal.com/gui/file/16a178b33877f9c3219bbe1685bfb879b7c8ab8965dbc734fd49ecb02e8c9d01/relations

View Most Recent Advisories