Skip to main content

Deploying NetSupport RAT via WordPress & ClickFix

Medium
Published: Thu Jul 10 2025 (07/10/2025, 21:49:18 UTC)
Source: AlienVault OTX General

Description

A threat actor is using compromised WordPress websites to distribute a malicious version of NetSupport Manager Remote Access Tool (RAT). The attack chain involves phishing campaigns, website compromise, DOM manipulation, and a fake CAPTCHA page. The malware is delivered through a batch file that downloads and executes NetSupport Client files. Post-infection, the attacker uses NetSupport's features for reconnaissance and further exploitation. The attack utilizes various JavaScript files and DOM manipulation techniques to evade detection. Multiple IP addresses and domains associated with the attack infrastructure have been identified, primarily linked to hosting providers in Moldova.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:16:22 UTC

Technical Analysis

This threat involves a sophisticated attack campaign leveraging compromised WordPress websites to distribute a malicious variant of the NetSupport Manager Remote Access Tool (RAT). The attackers initiate the infection chain through phishing campaigns that lure victims to compromised WordPress sites. These sites have been manipulated using Document Object Model (DOM) techniques and injected JavaScript files to evade detection and present a fake CAPTCHA page, increasing the likelihood of user interaction and trust. Upon interaction, a batch file is downloaded and executed on the victim's machine, which subsequently downloads and runs the NetSupport Client component. NetSupport Manager is a legitimate remote administration tool often used for remote support, but in this context, it is weaponized as a RAT to provide attackers with persistent remote access. Post-infection, the attackers exploit NetSupport's built-in capabilities for reconnaissance, lateral movement, and further exploitation within the victim environment. The attack infrastructure is linked to multiple IP addresses and domains, many associated with hosting providers in Moldova, indicating a geographically clustered command and control setup. The use of compromised WordPress sites and phishing campaigns highlights a multi-stage attack vector combining social engineering, web compromise, and malware deployment. The threat actors employ advanced evasion techniques such as DOM manipulation and multiple JavaScript payloads to avoid detection by security tools. Although no specific CVE or known exploits in the wild are reported, the attack leverages common tactics, techniques, and procedures (TTPs) including phishing (T1566), execution through batch files (T1059.003), remote access (T1021.001), persistence (T1547.001), and reconnaissance (T1082, T1016). The medium severity rating reflects the complexity and potential impact of the attack, though it requires user interaction and initial phishing success to propagate.

Potential Impact

For European organizations, this threat poses significant risks primarily due to the widespread use of WordPress for websites and the legitimate nature of NetSupport Manager, which may bypass some security controls. Successful compromise can lead to unauthorized remote access, data exfiltration, espionage, and lateral movement within corporate networks. The use of phishing and fake CAPTCHA pages increases the likelihood of user compromise, especially in organizations with less mature security awareness programs. The attack can disrupt business operations, compromise sensitive data, and damage organizational reputation. Given the multi-stage nature of the attack and the use of legitimate remote access tools, detection and response can be challenging, potentially allowing attackers prolonged access. European organizations in sectors with high-value data or critical infrastructure may face increased risk of targeted exploitation or espionage. Additionally, the presence of hosting infrastructure in Moldova may complicate attribution and takedown efforts, prolonging the threat's persistence in the region.

Mitigation Recommendations

1. Harden WordPress installations by regularly applying security patches, removing unused plugins/themes, and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for administrative access. 2. Implement robust phishing awareness training tailored to recognize fake CAPTCHA pages and suspicious download prompts. 3. Employ advanced web application firewalls (WAFs) capable of detecting DOM manipulation and anomalous JavaScript behavior on websites. 4. Monitor network traffic for connections to known malicious IP addresses and domains associated with this campaign, leveraging threat intelligence feeds to update blocklists. 5. Restrict or monitor the use of remote administration tools like NetSupport Manager, ensuring they are only installed and used by authorized personnel with strict access controls and logging enabled. 6. Deploy endpoint detection and response (EDR) solutions capable of identifying batch file executions and unusual process behaviors related to NetSupport Client components. 7. Conduct regular audits of website integrity and implement file integrity monitoring to detect unauthorized changes indicative of compromise. 8. Segment networks to limit lateral movement opportunities post-compromise and enforce the principle of least privilege. 9. Establish incident response procedures specifically addressing RAT infections and remote access tool abuse. 10. Collaborate with hosting providers and law enforcement to report and mitigate malicious infrastructure, particularly those located in Moldova.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix/"]
Adversary
null
Pulse Id
6870355e6a5f2386068698a0
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip193.111.208.110
ip79.141.173.158
ip94.158.245.131
ip107.180.0.222
ip50.87.146.66
ip77.83.199.34
ip83.229.17.68
ip94.158.245.104
ip94.158.245.118
ip94.158.245.137

Hash

ValueDescriptionCopy
hash1768c9971cea4cc10c7dd45a5f8f022a
hash20ed4df3a9c734c1788bd2ca2658aedb
hash4f496bfde39ca83644265d8d1d9bc9da
hash9c4349534c137e3e43fb2e2caf049f9d
hashc05f8ec5afbabc36f1c1366549290ae6
hashee75b57b9300aab96530503bfae8a2f2
hash3d199bee412cbac0a6d2c4c9fd5509ad12a667e7
hash98dd757e1c1fa8b5605bda892aa0b82ebefa1f07
hashec54e200a791480fa3341ff5db4beb3662b885f1
hash06a0a243811e9c4738a9d413597659ca8d07b00f640b74adc9cb351c179b3268
hash35ab9ebd4f80da4b4f315f7e8aab038687d681f86dd9015469c7806ad6ab638a
hash6558b3307215c4b73fc96dc552213427fb9b28c0cb282fe6c38324f1e68e87d6

Domain

ValueDescriptionCopy
domainace-project.org
domainbadgervolleyball.org
domainchristianlouboutin2017.top
domainfmovies123.top
domainjaagnet.com
domainjakestrack.com
domainlang3666.top
domainpemptousia.com

Threat ID: 68703822a83201eaacaa3b31

Added to database: 7/10/2025, 10:01:06 PM

Last enriched: 7/10/2025, 10:16:22 PM

Last updated: 7/11/2025, 3:48:38 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats