Deploying NetSupport RAT via WordPress & ClickFix
A threat actor is using compromised WordPress websites to distribute a malicious version of NetSupport Manager Remote Access Tool (RAT). The attack chain involves phishing campaigns, website compromise, DOM manipulation, and a fake CAPTCHA page. The malware is delivered through a batch file that downloads and executes NetSupport Client files. Post-infection, the attacker uses NetSupport's features for reconnaissance and further exploitation. The attack utilizes various JavaScript files and DOM manipulation techniques to evade detection. Multiple IP addresses and domains associated with the attack infrastructure have been identified, primarily linked to hosting providers in Moldova.
AI Analysis
Technical Summary
This threat involves a sophisticated attack campaign leveraging compromised WordPress websites to distribute a malicious variant of the NetSupport Manager Remote Access Tool (RAT). The attackers initiate the infection chain through phishing campaigns that lure victims to compromised WordPress sites. These sites have been manipulated using Document Object Model (DOM) techniques and injected JavaScript files to evade detection and present a fake CAPTCHA page, increasing the likelihood of user interaction and trust. Upon interaction, a batch file is downloaded and executed on the victim's machine, which subsequently downloads and runs the NetSupport Client component. NetSupport Manager is a legitimate remote administration tool often used for remote support, but in this context, it is weaponized as a RAT to provide attackers with persistent remote access. Post-infection, the attackers exploit NetSupport's built-in capabilities for reconnaissance, lateral movement, and further exploitation within the victim environment. The attack infrastructure is linked to multiple IP addresses and domains, many associated with hosting providers in Moldova, indicating a geographically clustered command and control setup. The use of compromised WordPress sites and phishing campaigns highlights a multi-stage attack vector combining social engineering, web compromise, and malware deployment. The threat actors employ advanced evasion techniques such as DOM manipulation and multiple JavaScript payloads to avoid detection by security tools. Although no specific CVE or known exploits in the wild are reported, the attack leverages common tactics, techniques, and procedures (TTPs) including phishing (T1566), execution through batch files (T1059.003), remote access (T1021.001), persistence (T1547.001), and reconnaissance (T1082, T1016). The medium severity rating reflects the complexity and potential impact of the attack, though it requires user interaction and initial phishing success to propagate.
Potential Impact
For European organizations, this threat poses significant risks primarily due to the widespread use of WordPress for websites and the legitimate nature of NetSupport Manager, which may bypass some security controls. Successful compromise can lead to unauthorized remote access, data exfiltration, espionage, and lateral movement within corporate networks. The use of phishing and fake CAPTCHA pages increases the likelihood of user compromise, especially in organizations with less mature security awareness programs. The attack can disrupt business operations, compromise sensitive data, and damage organizational reputation. Given the multi-stage nature of the attack and the use of legitimate remote access tools, detection and response can be challenging, potentially allowing attackers prolonged access. European organizations in sectors with high-value data or critical infrastructure may face increased risk of targeted exploitation or espionage. Additionally, the presence of hosting infrastructure in Moldova may complicate attribution and takedown efforts, prolonging the threat's persistence in the region.
Mitigation Recommendations
1. Harden WordPress installations by regularly applying security patches, removing unused plugins/themes, and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for administrative access. 2. Implement robust phishing awareness training tailored to recognize fake CAPTCHA pages and suspicious download prompts. 3. Employ advanced web application firewalls (WAFs) capable of detecting DOM manipulation and anomalous JavaScript behavior on websites. 4. Monitor network traffic for connections to known malicious IP addresses and domains associated with this campaign, leveraging threat intelligence feeds to update blocklists. 5. Restrict or monitor the use of remote administration tools like NetSupport Manager, ensuring they are only installed and used by authorized personnel with strict access controls and logging enabled. 6. Deploy endpoint detection and response (EDR) solutions capable of identifying batch file executions and unusual process behaviors related to NetSupport Client components. 7. Conduct regular audits of website integrity and implement file integrity monitoring to detect unauthorized changes indicative of compromise. 8. Segment networks to limit lateral movement opportunities post-compromise and enforce the principle of least privilege. 9. Establish incident response procedures specifically addressing RAT infections and remote access tool abuse. 10. Collaborate with hosting providers and law enforcement to report and mitigate malicious infrastructure, particularly those located in Moldova.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Indicators of Compromise
- ip: 193.111.208.110
- ip: 79.141.173.158
- ip: 94.158.245.131
- hash: 1768c9971cea4cc10c7dd45a5f8f022a
- hash: 20ed4df3a9c734c1788bd2ca2658aedb
- hash: 4f496bfde39ca83644265d8d1d9bc9da
- hash: 9c4349534c137e3e43fb2e2caf049f9d
- hash: c05f8ec5afbabc36f1c1366549290ae6
- hash: ee75b57b9300aab96530503bfae8a2f2
- hash: 3d199bee412cbac0a6d2c4c9fd5509ad12a667e7
- hash: 98dd757e1c1fa8b5605bda892aa0b82ebefa1f07
- hash: ec54e200a791480fa3341ff5db4beb3662b885f1
- hash: 06a0a243811e9c4738a9d413597659ca8d07b00f640b74adc9cb351c179b3268
- hash: 35ab9ebd4f80da4b4f315f7e8aab038687d681f86dd9015469c7806ad6ab638a
- hash: 6558b3307215c4b73fc96dc552213427fb9b28c0cb282fe6c38324f1e68e87d6
- ip: 107.180.0.222
- ip: 50.87.146.66
- ip: 77.83.199.34
- ip: 83.229.17.68
- ip: 94.158.245.104
- ip: 94.158.245.118
- ip: 94.158.245.137
- domain: ace-project.org
- domain: badgervolleyball.org
- domain: christianlouboutin2017.top
- domain: fmovies123.top
- domain: jaagnet.com
- domain: jakestrack.com
- domain: lang3666.top
- domain: pemptousia.com
Deploying NetSupport RAT via WordPress & ClickFix
Description
A threat actor is using compromised WordPress websites to distribute a malicious version of NetSupport Manager Remote Access Tool (RAT). The attack chain involves phishing campaigns, website compromise, DOM manipulation, and a fake CAPTCHA page. The malware is delivered through a batch file that downloads and executes NetSupport Client files. Post-infection, the attacker uses NetSupport's features for reconnaissance and further exploitation. The attack utilizes various JavaScript files and DOM manipulation techniques to evade detection. Multiple IP addresses and domains associated with the attack infrastructure have been identified, primarily linked to hosting providers in Moldova.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated attack campaign leveraging compromised WordPress websites to distribute a malicious variant of the NetSupport Manager Remote Access Tool (RAT). The attackers initiate the infection chain through phishing campaigns that lure victims to compromised WordPress sites. These sites have been manipulated using Document Object Model (DOM) techniques and injected JavaScript files to evade detection and present a fake CAPTCHA page, increasing the likelihood of user interaction and trust. Upon interaction, a batch file is downloaded and executed on the victim's machine, which subsequently downloads and runs the NetSupport Client component. NetSupport Manager is a legitimate remote administration tool often used for remote support, but in this context, it is weaponized as a RAT to provide attackers with persistent remote access. Post-infection, the attackers exploit NetSupport's built-in capabilities for reconnaissance, lateral movement, and further exploitation within the victim environment. The attack infrastructure is linked to multiple IP addresses and domains, many associated with hosting providers in Moldova, indicating a geographically clustered command and control setup. The use of compromised WordPress sites and phishing campaigns highlights a multi-stage attack vector combining social engineering, web compromise, and malware deployment. The threat actors employ advanced evasion techniques such as DOM manipulation and multiple JavaScript payloads to avoid detection by security tools. Although no specific CVE or known exploits in the wild are reported, the attack leverages common tactics, techniques, and procedures (TTPs) including phishing (T1566), execution through batch files (T1059.003), remote access (T1021.001), persistence (T1547.001), and reconnaissance (T1082, T1016). The medium severity rating reflects the complexity and potential impact of the attack, though it requires user interaction and initial phishing success to propagate.
Potential Impact
For European organizations, this threat poses significant risks primarily due to the widespread use of WordPress for websites and the legitimate nature of NetSupport Manager, which may bypass some security controls. Successful compromise can lead to unauthorized remote access, data exfiltration, espionage, and lateral movement within corporate networks. The use of phishing and fake CAPTCHA pages increases the likelihood of user compromise, especially in organizations with less mature security awareness programs. The attack can disrupt business operations, compromise sensitive data, and damage organizational reputation. Given the multi-stage nature of the attack and the use of legitimate remote access tools, detection and response can be challenging, potentially allowing attackers prolonged access. European organizations in sectors with high-value data or critical infrastructure may face increased risk of targeted exploitation or espionage. Additionally, the presence of hosting infrastructure in Moldova may complicate attribution and takedown efforts, prolonging the threat's persistence in the region.
Mitigation Recommendations
1. Harden WordPress installations by regularly applying security patches, removing unused plugins/themes, and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for administrative access. 2. Implement robust phishing awareness training tailored to recognize fake CAPTCHA pages and suspicious download prompts. 3. Employ advanced web application firewalls (WAFs) capable of detecting DOM manipulation and anomalous JavaScript behavior on websites. 4. Monitor network traffic for connections to known malicious IP addresses and domains associated with this campaign, leveraging threat intelligence feeds to update blocklists. 5. Restrict or monitor the use of remote administration tools like NetSupport Manager, ensuring they are only installed and used by authorized personnel with strict access controls and logging enabled. 6. Deploy endpoint detection and response (EDR) solutions capable of identifying batch file executions and unusual process behaviors related to NetSupport Client components. 7. Conduct regular audits of website integrity and implement file integrity monitoring to detect unauthorized changes indicative of compromise. 8. Segment networks to limit lateral movement opportunities post-compromise and enforce the principle of least privilege. 9. Establish incident response procedures specifically addressing RAT infections and remote access tool abuse. 10. Collaborate with hosting providers and law enforcement to report and mitigate malicious infrastructure, particularly those located in Moldova.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix/"]
- Adversary
- null
- Pulse Id
- 6870355e6a5f2386068698a0
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip193.111.208.110 | — | |
ip79.141.173.158 | — | |
ip94.158.245.131 | — | |
ip107.180.0.222 | — | |
ip50.87.146.66 | — | |
ip77.83.199.34 | — | |
ip83.229.17.68 | — | |
ip94.158.245.104 | — | |
ip94.158.245.118 | — | |
ip94.158.245.137 | — |
Hash
Value | Description | Copy |
---|---|---|
hash1768c9971cea4cc10c7dd45a5f8f022a | — | |
hash20ed4df3a9c734c1788bd2ca2658aedb | — | |
hash4f496bfde39ca83644265d8d1d9bc9da | — | |
hash9c4349534c137e3e43fb2e2caf049f9d | — | |
hashc05f8ec5afbabc36f1c1366549290ae6 | — | |
hashee75b57b9300aab96530503bfae8a2f2 | — | |
hash3d199bee412cbac0a6d2c4c9fd5509ad12a667e7 | — | |
hash98dd757e1c1fa8b5605bda892aa0b82ebefa1f07 | — | |
hashec54e200a791480fa3341ff5db4beb3662b885f1 | — | |
hash06a0a243811e9c4738a9d413597659ca8d07b00f640b74adc9cb351c179b3268 | — | |
hash35ab9ebd4f80da4b4f315f7e8aab038687d681f86dd9015469c7806ad6ab638a | — | |
hash6558b3307215c4b73fc96dc552213427fb9b28c0cb282fe6c38324f1e68e87d6 | — |
Domain
Value | Description | Copy |
---|---|---|
domainace-project.org | — | |
domainbadgervolleyball.org | — | |
domainchristianlouboutin2017.top | — | |
domainfmovies123.top | — | |
domainjaagnet.com | — | |
domainjakestrack.com | — | |
domainlang3666.top | — | |
domainpemptousia.com | — |
Threat ID: 68703822a83201eaacaa3b31
Added to database: 7/10/2025, 10:01:06 PM
Last enriched: 7/10/2025, 10:16:22 PM
Last updated: 7/11/2025, 3:48:38 AM
Views: 5
Related Threats
Attackers Inject Code into WordPress Theme to Redirect Visitors
MediumPatch, track, repeat
MediumThreatFox IOCs for 2025-07-10
MediumAnalysis of APT-C-55 (Kimsuky) Organization's HappyDoor Backdoor Attack Based on VMP Strong Shell
MediumAtomic macOS Stealer includes a backdoor for persistent access
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.