Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    Apollo joins the Works With Home Assistant Program

    June 6, 2025

    Volvo’s new seatbelts use real-time data to adapt to different body types

    June 6, 2025

    Graphene thermal pad for AMD CPUs promises 17X better conductivity than thermal paste, 2X improvement over Thermal Grizzly

    June 6, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
    Cyber Security

    Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

    MichaBy MichaJune 4, 2025No Comments4 Mins Read
    Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack


    Introduction

    As cyber threats continue to evolve, a recent campaign utilizing deceptive websites has come to light, tricking users into executing malicious PowerShell scripts. These scripts ultimately deliver the notorious NetSupport RAT malware. In this article, we delve into the alarming details uncovered by the DomainTools Investigations (DTI) team, explore the mechanics of this fraudulent operation, and provide essential cybersecurity insights to protect yourself from such threats.

    Understanding the Threat: A New Cyber Campaign

    Threat hunters recently alerted cybersecurity communities about a sophisticated campaign that leverages counterfeit websites to deceive unsuspecting users. By masquerading as legitimate platforms like Gitcode and DocuSign, these sites trick users into executing malicious PowerShell scripts that result in the installation of the NetSupport Remote Access Trojan (RAT).

    How the Attack Unfolds

    According to the DTI team’s technical report shared with The Hacker News, the attack process involves several stages of deception:

    • Malicious Websites: The counterfeit sites host elaborate PowerShell scripts that users are duped into copying and executing on their machines through the Windows Run command.
    • Multi-Stage Downloads: The initial PowerShell script downloads additional scripts sequentially from an external server, ultimately leading to the installation of NetSupport RAT.
    • Social Engineering Tactics: The campaign is believed to spread via social engineering, primarily through email phishing attempts and social media platforms.

    Clipboard Poisoning: A Deceptive Technique

    In a particularly cunning move, the attackers utilize a technique known as clipboard poisoning. Upon arriving at the spoofed site, victims are prompted to complete a CAPTCHA verification process. Triggering this CAPTCHA automatically copies an obfuscated PowerShell command to the user’s clipboard. Victims are then instructed to launch the Windows Run dialog, paste the command, and execute it—thereby unleashing the malware.

    The Danger of NetSupport RAT

    NetSupport Manager is commonly known as a legitimate administrative tool. However, threat actors have increasingly adopted it as a remote access tool (RAT) to carry out malicious activities. Cybersecurity experts warn that multiple threat groups, including FIN7 and Storm-0408, utilize this software, posing significant risks to both individual users and organizations.

    How the Malware Persists

    The PowerShell scripts are designed to establish persistence, ensuring that the malware activates automatically at system startup. Though the initial payload was unavailable during investigations, it communicates with its command-and-control server to maintain its foothold on the infected system.

    How to Protect Yourself

    Given the complexity of these attacks, robust cybersecurity measures are essential. Here are several strategies to mitigate risks:

    • Stay Informed: Regularly update your knowledge about the latest threat vectors and techniques used by cybercriminals.
    • Use Reliable Security Software: Employ antivirus and anti-malware tools that provide real-time protection against emerging threats.
    • Think Before You Click: Remain vigilant while engaging with emails or social media links to avoid falling victim to phishing attempts.
    • Educate Yourself and Others: Understanding how these scams work helps in raising awareness, bolstering defenses against similar attacks.

    Recent Examples of Cyber Attacks

    In addition to the NetSupport RAT campaign, cybersecurity professionals have reported an increase in multifaceted attacks mimicking legitimate services. Similar to the above campaign, the EDDIESTEALER infostealer utilized deceptive practices to lure users into executing harmful scripts. Such examples underline the importance of vigilance and proactive security measures in the ever-evolving cybersecurity landscape.

    Frequently Asked Questions (FAQ)

    Question 1: What is NetSupport RAT?

    NetSupport RAT is a remote access tool that allows cybercriminals to gain control over a compromised system. It enables them to execute files, capture keystrokes, and perform other malicious activities.

    Question 2: How can I identify phishing attempts?

    Look for signs of phishing, such as poor spelling, unfamiliar sender addresses, and suspicious links. Always verify requests through official channels before clicking any links.

    Question 3: What should I do if I suspect my computer is infected?

    If you think your system may be compromised, immediately disconnect from the internet, run a full system scan using reputable antivirus software, and consider restoring your system from a previous backup.

    Staying informed and adopting best practices in cybersecurity can significantly reduce the risk of falling victim to evolving threats like the NetSupport RAT. Take action today to safeguard your digital presence.



    Read the original article

    0 Like this
    Attack Docusign Fake Gitcode MultiStage NetSupport PowerShell RAT sites spread
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleInside the effort to tally AI’s energy appetite
    Next Article Optimizing the electron transport layer

    Related Posts

    Cyber Security

    Google’s upcoming Gemini Kingfall is allegedly a coding beast

    June 6, 2025
    Cyber Security

    Don’t let dormant accounts become a doorway for cybercriminals

    June 4, 2025
    Cyber Security

    OpenAI is hopeful GPT-5 will compete a little more

    June 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.