Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Bogus CAPTCHA Lures Install NetSupport RAT

June 4, 2025
Reading Time: 3 mins read
in Alerts
Crocodilus Trojan Steals Crypto Globally

Threat actors are exploiting “Prove You Are Human” CAPTCHA systems to distribute various types of malicious software to unsuspecting users. This recently identified campaign leverages spoofed websites that convincingly mimic legitimate platforms like Gitcodes and also popular DocuSign services. These deceptive sites are specifically designed to trick users into executing harmful PowerShell scripts directly on their vulnerable Windows computer systems. The multi-stage attack ultimately installs the NetSupport Remote Access Trojan, a tool frequently abused by cybercriminals for unauthorized system access and control. The attack often begins with users being lured to fraudulent websites presenting seemingly innocuous CAPTCHA-like challenges that require script execution.

These CAPTCHA challenges typically prompt users to copy a provided script and then paste it into the Windows Run prompt for execution.

This initial script, which is often hosted on platforms such as Gitcodes, primarily acts as a downloader for subsequent malicious stages. It then fetches other scripts from various attacker-controlled domains like tradingviewtool[.]com, thereby initiating a more complex infection chain on the system. Through a carefully orchestrated series of web requests, the cyberattack progresses through multiple distinct stages, each script downloading the next component. This sophisticated process then culminates in the full deployment of the NetSupport RAT, establishing a persistent backdoor for the attackers. Persistence is commonly achieved by embedding the malware into the Windows Registry’s Run key or the user’s Startup folder for stealth.

In the DocuSign spoofing variant of this particular attack, cybercriminals employ clever clipboard poisoning techniques against their specifically targeted victims. A ROT13-encoded script is automatically copied to the victim’s clipboard upon their direct interaction with a specially designed fake CAPTCHA checkbox. Users are then explicitly instructed by the fake page to paste and run this script using Win+R commands on their machines. This critical action then triggers the download of additional harmful payloads, such as wbdims.exe from GitHub or jp2launcher.exe from zipped archives. These downloaded scripts subsequently communicate with command-and-control servers, facilitating further malicious downloads and also browser page refreshes to deepen the infection. This intricate, multi-layered approach effectively aims to evade detection by breaking the entire attack into smaller, less conspicuous operational steps.

While the precise attribution for this ongoing campaign currently remains unclear, certain observed patterns in domain registration and payload reuse suggest potential overlaps. These overlaps could be with well-known threat groups like SocGholish or other cybercriminal actors such as FIN7 and also STORM-0408. The core sophistication of this particular campaign lies in its exploitation of user trust in familiar online verification interactions by attackers. Cybersecurity experts strongly urge extreme vigilance because legitimate websites very rarely demand any form of direct script execution from their users. Verifying website URLs, carefully checking SSL certificates, and completely avoiding unverified clipboard content are critical steps to mitigate this growing online threat. This underscores the continuous urgent need for comprehensive user education in an ever-evolving landscape of dangerous social engineering attacks.

Reference:

  • Attackers Use Fake CAPTCHAs On Bogus Sites To Deploy NetSupport RAT
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial