SmartApeSG campaign uses ClickFix page to push NetSupport RAT, (Wed, Nov 12th)
The SmartApeSG campaign is a malware distribution operation that uses compromised websites to display fake CAPTCHA-style verification pages, tricking users into executing malicious commands that install the NetSupport RAT on Windows hosts. This RAT persists via a Start Menu shortcut running a JavaScript file from the user's AppData\Local\Temp directory, which launches the RAT executable stored under C:\ProgramData. The campaign has evolved from fake browser update pages to the current ClickFix fake CAPTCHA method, with domains and payloads frequently changing to evade detection. Infection requires user interaction to follow instructions and paste a command into the Run window, which downloads and executes the RAT. The RAT enables remote control of infected machines, potentially leading to further malware deployment. Although no known exploits in the wild are reported, the campaign has been active since mid-2024 and continues to adapt. The threat is medium severity due to the need for user interaction and the complexity of infection, but it poses significant risks to confidentiality and integrity if successful.
AI Analysis
Technical Summary
The SmartApeSG campaign is a malware infection chain that leverages compromised websites to deliver the NetSupport Remote Access Trojan (RAT) to Windows systems. Initially reported in June 2024, the campaign has shifted its infection vector from fake browser update pages to a more sophisticated ClickFix-style fake CAPTCHA page, which prompts users to verify they are human. When conditions are met, the compromised site injects a hidden script that triggers the display of a fake CAPTCHA page. Upon user interaction—clicking the verification box—the campaign injects a malicious command into the Windows clipboard. The user is then instructed via a pop-up to open the Run dialog, paste the clipboard content, and execute it. This command uses the mshta utility to download and execute malicious scripts that ultimately install the NetSupport RAT. The RAT package is delivered as a zip archive from frequently changing domains and is extracted to the C:\ProgramData directory. Persistence is maintained through a Start Menu shortcut that runs a JavaScript file from the user's AppData\Local\Temp folder, which in turn launches the RAT executable. The RAT communicates with its command and control (C2) server over TCP port 443, using encrypted channels to evade network detection. The campaign's infrastructure is dynamic, with domains and payloads changing almost daily, complicating detection and blocking efforts. While exploitation requires user interaction and some manual steps, the RAT's capabilities allow attackers to remotely control infected machines, potentially leading to data exfiltration, lateral movement, and deployment of additional malware. Indicators of compromise include specific URLs hosting injected scripts, fake CAPTCHA pages, and the malicious zip archive. The campaign is monitored via social media and URL scanning services, highlighting its ongoing activity and evolution.
Potential Impact
For European organizations, the SmartApeSG campaign poses a significant risk primarily through social engineering and web compromise vectors. Successful infections can lead to unauthorized remote access, data theft, espionage, and further malware infections, threatening confidentiality and integrity of sensitive information. The persistence mechanism and encrypted C2 communications make detection and remediation challenging. Organizations with employees frequently accessing compromised or untrusted websites are particularly vulnerable. The campaign's use of dynamic infrastructure and changing domains complicates traditional signature-based defenses. Additionally, the requirement for user interaction means that phishing awareness and user training are critical. The campaign could impact sectors with high-value data or critical infrastructure, including finance, government, and technology sectors prevalent in Europe. The medium severity reflects the balance between the need for user action and the potential for significant damage if compromised. Disruptions could also affect operational availability if infected systems are used as footholds for broader attacks.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this campaign's tactics. First, enhance web filtering to block access to known malicious domains and URLs associated with SmartApeSG, leveraging threat intelligence feeds that track the campaign's dynamic infrastructure. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious use of mshta.exe and unusual clipboard activity. Restrict or monitor the use of mshta and execution of scripts from temporary directories via application control policies. Conduct targeted user awareness training focusing on the risks of executing commands from untrusted sources and recognizing fake CAPTCHA or verification pages. Implement strict privilege management to limit user ability to execute arbitrary commands and create persistence mechanisms. Regularly audit and monitor Start Menu shortcuts and AppData\Local\Temp directories for unauthorized scripts or executables. Employ network monitoring to detect anomalous outbound traffic on TCP port 443 that may indicate RAT C2 communications. Finally, maintain up-to-date backups and incident response plans to quickly remediate infections. Collaboration with threat intelligence sharing platforms can provide timely updates on evolving indicators and tactics used by SmartApeSG.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
SmartApeSG campaign uses ClickFix page to push NetSupport RAT, (Wed, Nov 12th)
Description
The SmartApeSG campaign is a malware distribution operation that uses compromised websites to display fake CAPTCHA-style verification pages, tricking users into executing malicious commands that install the NetSupport RAT on Windows hosts. This RAT persists via a Start Menu shortcut running a JavaScript file from the user's AppData\Local\Temp directory, which launches the RAT executable stored under C:\ProgramData. The campaign has evolved from fake browser update pages to the current ClickFix fake CAPTCHA method, with domains and payloads frequently changing to evade detection. Infection requires user interaction to follow instructions and paste a command into the Run window, which downloads and executes the RAT. The RAT enables remote control of infected machines, potentially leading to further malware deployment. Although no known exploits in the wild are reported, the campaign has been active since mid-2024 and continues to adapt. The threat is medium severity due to the need for user interaction and the complexity of infection, but it poses significant risks to confidentiality and integrity if successful.
AI-Powered Analysis
Technical Analysis
The SmartApeSG campaign is a malware infection chain that leverages compromised websites to deliver the NetSupport Remote Access Trojan (RAT) to Windows systems. Initially reported in June 2024, the campaign has shifted its infection vector from fake browser update pages to a more sophisticated ClickFix-style fake CAPTCHA page, which prompts users to verify they are human. When conditions are met, the compromised site injects a hidden script that triggers the display of a fake CAPTCHA page. Upon user interaction—clicking the verification box—the campaign injects a malicious command into the Windows clipboard. The user is then instructed via a pop-up to open the Run dialog, paste the clipboard content, and execute it. This command uses the mshta utility to download and execute malicious scripts that ultimately install the NetSupport RAT. The RAT package is delivered as a zip archive from frequently changing domains and is extracted to the C:\ProgramData directory. Persistence is maintained through a Start Menu shortcut that runs a JavaScript file from the user's AppData\Local\Temp folder, which in turn launches the RAT executable. The RAT communicates with its command and control (C2) server over TCP port 443, using encrypted channels to evade network detection. The campaign's infrastructure is dynamic, with domains and payloads changing almost daily, complicating detection and blocking efforts. While exploitation requires user interaction and some manual steps, the RAT's capabilities allow attackers to remotely control infected machines, potentially leading to data exfiltration, lateral movement, and deployment of additional malware. Indicators of compromise include specific URLs hosting injected scripts, fake CAPTCHA pages, and the malicious zip archive. The campaign is monitored via social media and URL scanning services, highlighting its ongoing activity and evolution.
Potential Impact
For European organizations, the SmartApeSG campaign poses a significant risk primarily through social engineering and web compromise vectors. Successful infections can lead to unauthorized remote access, data theft, espionage, and further malware infections, threatening confidentiality and integrity of sensitive information. The persistence mechanism and encrypted C2 communications make detection and remediation challenging. Organizations with employees frequently accessing compromised or untrusted websites are particularly vulnerable. The campaign's use of dynamic infrastructure and changing domains complicates traditional signature-based defenses. Additionally, the requirement for user interaction means that phishing awareness and user training are critical. The campaign could impact sectors with high-value data or critical infrastructure, including finance, government, and technology sectors prevalent in Europe. The medium severity reflects the balance between the need for user action and the potential for significant damage if compromised. Disruptions could also affect operational availability if infected systems are used as footholds for broader attacks.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this campaign's tactics. First, enhance web filtering to block access to known malicious domains and URLs associated with SmartApeSG, leveraging threat intelligence feeds that track the campaign's dynamic infrastructure. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious use of mshta.exe and unusual clipboard activity. Restrict or monitor the use of mshta and execution of scripts from temporary directories via application control policies. Conduct targeted user awareness training focusing on the risks of executing commands from untrusted sources and recognizing fake CAPTCHA or verification pages. Implement strict privilege management to limit user ability to execute arbitrary commands and create persistence mechanisms. Regularly audit and monitor Start Menu shortcuts and AppData\Local\Temp directories for unauthorized scripts or executables. Employ network monitoring to detect anomalous outbound traffic on TCP port 443 that may indicate RAT C2 communications. Finally, maintain up-to-date backups and incident response plans to quickly remediate infections. Collaboration with threat intelligence sharing platforms can provide timely updates on evolving indicators and tactics used by SmartApeSG.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32474","fetched":true,"fetchedAt":"2025-11-12T21:53:55.904Z","wordCount":661}
Threat ID: 691501f3e6b3e50d5094b0e8
Added to database: 11/12/2025, 9:53:55 PM
Last enriched: 11/12/2025, 9:54:14 PM
Last updated: 11/12/2025, 11:28:44 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13076: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-13075: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-64517: CWE-287: Improper Authentication in trifectatechfoundation sudo-rs
MediumCVE-2025-64503: CWE-787: Out-of-bounds Write in OpenPrinting cups-filters
MediumCVE-2025-64482: CWE-352: Cross-Site Request Forgery (CSRF) in Enalean tuleap
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.