Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

NetSupport RAT Exploited in Ongoing Attacks

August 1, 2024
Reading Time: 2 mins read
in Alerts

The NetSupport Manager, a legitimate tool for remote device management, has been repurposed by threat actors as a Remote Access Trojan (RAT) to conduct various malicious activities. The software’s widespread functionality and accessibility make it a preferred choice among cybercriminals, who exploit it to gain unauthorized control over target devices. Cisco Talos has closely monitored recent campaigns involving NetSupport RAT, with attackers using intricate evasion tactics and continuous obfuscation updates to bypass traditional detection methods. By hiding payloads within JavaScript and PowerShell scripts, attackers have created a multi-stage infection process that leverages obfuscation and diverse delivery mechanisms, increasing the RAT’s resilience against detection.

The infection process typically begins when a user encounters malicious ads or compromised websites containing a JavaScript downloader, which initiates the first stage. This downloader executes an obfuscated PowerShell script that extracts the RAT payload and establishes persistence on the victim’s device. The payload, essentially a portable installation of NetSupport Manager, is embedded with additional scripts to enhance stealth and evade detection. Recent versions of this malware have incorporated randomized installation paths and more sophisticated obfuscation in the initial stager, making detection even more challenging.

Cisco Talos observed that the attackers continually refine these evasion methods, adjusting each version to counter evolving security measures. Cisco Talos has responded to these threats by developing advanced detection strategies. Using tools like Snort, they created fast-pattern-only rules and HTTP service inspections, which identify and block malicious activity before it reaches endpoints. These rules are designed to detect unique features in the RAT’s deployment, such as the registry entries used for persistence and the typical PowerShell flags that facilitate installation. By leveraging both static and behavioral detection techniques, Cisco Talos aims to create a comprehensive defense, capable of intercepting the RAT across a broad range of protocols and attack surfaces. Open-source tools like Snort and Sigma provide an additional advantage by enabling real-time tracking of malicious campaigns and allowing prompt response to newly identified indicators of compromise.

NetSupport RAT continues to be an active threat, with attackers exploiting its legitimate attributes to disguise malicious intent and reach a broader array of targets. Cisco Talos’ analysis highlights the growing trend of reusing commercial software in cybercrime, as these tools often evade initial scrutiny due to their legitimate origins. While threat actors persist in refining obfuscation tactics, Talos’ multi-faceted approach — from pattern-based detection to behavioral analysis — offers a robust solution to combat this persistent but not highly advanced threat. The findings underscore the importance of proactive detection and collaborative security efforts to keep pace with evolving threats like NetSupport RAT, ensuring that organizations can swiftly identify and mitigate malicious activity.

Reference:

  • Detecting evolving threats: NetSupport RAT campaign

Tags: August 2024Cisco TalosCyber AlertsCyber Alerts 2024Cyber threatsNetSupportNetSupport RATRemote Access TrojanSigmaSNORT
ADVERTISEMENT

Related Posts

COLDRIVER Hackers Target Sensitive Data

COLDRIVER Hackers Target Sensitive Data

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

CoGUI Targets Consumer and Finance Brands

May 8, 2025
Critical Kibana Flaws Allows Code Execution

Mirai Botnet Exploits Vulnerabilities in IoT

May 7, 2025
Critical Kibana Flaws Allows Code Execution

Critical Kibana Flaws Allows Code Execution

May 7, 2025
Critical Kibana Flaws Allows Code Execution

New OttoKit Flaw Targets WordPress Sites

May 7, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial