Threat actors are employing the NetSupport Remote Access Trojan (RAT) to target the education, government, and business services sectors, according to findings by VMware Carbon Black researchers. The NetSupport RAT is distributed through various methods, including fraudulent updates, drive-by downloads, malware loaders like GHOSTPULSE, and phishing campaigns.
VMware Carbon Black has identified at least 15 new infections related to NetSupport RAT in recent weeks. Originally designed as a legitimate remote administration tool, NetSupport Manager has been repurposed by malicious actors to serve as a beachhead for subsequent attacks.
The delivery mechanisms for NetSupport RAT involve deceptive websites, fake browser updates, and other means. In one campaign detailed in August 2022, compromised WordPress sites were used to display fraudulent Cloudflare DDoS protection pages, leading to the distribution of NetSupport RAT.
The use of deceptive web browser updates aligns with tactics associated with JavaScript-based downloader malware like SocGholish (FakeUpdates), known for spreading loader malware named BLISTER. The JavaScript payload triggers PowerShell to connect to a remote server and retrieve a ZIP archive containing NetSupport RAT, allowing it to establish communication with a command-and-control server upon installation.
Once installed on a victim’s device, NetSupport RAT possesses capabilities such as behavior monitoring, file transfers, manipulation of computer settings, and lateral movement to other devices within the network.
This malicious use of a tool initially designed for technical assistance underscores the evolving threat landscape and the adaptability of cybercriminals.