A new malicious campaign that threat hunters alerted is using disguised websites that impersonate Gitcode and DocuSign to trick users into running PowerShell scripts on their systems getting infected with NetSupport RAT. These spoofed sites often appear through phishing links on email or social media, by captcha verifications which copy and download malicious script to be run on windows prompt. In initial stage of attack, when a user visits a fake Gitcodes site like gitcodes[.]org or docusign.sa[.]com, a script often obfuscated using ROT13 is copied to the clipboard and executed on Windows run prompt. This script downloads second stage PowerShell script, which then makes 3 or more requests to domains like tradingviewtool[.]com and tradingviewtoolz[.]com to retrieve more payloads including zip utility used to unpack a malicious file named client32.exe, which is added to the system’s startup registry under the name “My Support” for persistence. The fake DocuSign CAPTCHA verifications also use similar PowerShell script to the clipboard copy, which downloads and runs a persistence script wbdims.exe from GitHub and auto-runs on login to launch payload automatically. After system checks with a remote server, a second script is deployed, unpacks and run third-stage payload (jp2launcher.exe) from a zip archive, that installs the NetSupport RAT and communicates with remote servers like mhousecreative[.]com and tailored IP address, thereby compromising. The threat actors employed multistaging of scripts downloads and execution to evade detection. Users must avoid copying and run code from untrusted websites. Organizations should block known malicious domains, monitor PowerShell activity, and educate users on phishing tactics. Security admins are advised to disable clipboard access for unknown websites and implement endpoint detection to detect multi-stage script execution.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...