Fake DocuSign and Gitcode Sites Distributing NetSupport RAT through Multi-Stage PowerShell Attack

Published:

spot_img

New Threat: Multi-Stage PowerShell Attack Targeting Users

Overview of the Campaign

Recent alerts from threat hunters indicate an ongoing campaign that leverages deceptive websites to lure users into executing harmful PowerShell scripts. This series of attacks primarily targets individuals through social engineering tactics to stealthily install NetSupport RAT (Remote Access Trojan) malware on their devices.

Malicious Scripts on Fake Sites

According to the DomainTools Investigations (DTI) team, they have detected “malicious multi-stage downloader PowerShell scripts” on counterfeit websites posing as reputable services like Gitcode and DocuSign. The deception begins when users are tricked into copying and executing an initial PowerShell script via their Windows Run command.

Once executed, this initial script proceeds to download another downloader script, which in turn retrieves further malicious payloads and ultimately leads to the installation of the NetSupport RAT on the compromised systems.

Distribution Methods

The counterfeit websites are suspected to be spread through social engineering attempts via email and various social media platforms. These tactics are designed to exploit unsuspecting users, presenting them with false legitimacy.

The PowerShell scripts found on these fraudulent Gitcode sites are specifically designed to sequentially download additional PowerShell scripts from an external server, namely “tradingviewtool[.]com”. The execution of these scripts is a crucial step toward deploying the NetSupport RAT on affected machines.

Use of CAPTCHA for User Deception

DomainTools also uncovered multiple websites mimicking DocuSign (for instance, docusign.sa[.]com) that deliver the same malware, but with an additional layer of trickery. These sites employ ClickFix-style CAPTCHA verifications, persuading users to validate their identity as non-robots.

This process is not merely a benign check; once users engage with the CAPTCHA, an obfuscated PowerShell command is secretly copied to the clipboard. Users are then prompted to open the Windows Run dialog, paste the command, and hit Enter, inadvertently executing the malicious script.

Persistence Strategy of the Malware

The script’s main objective includes downloading a persistence script named “wbdims.exe” from GitHub. This ensures that the malware is automatically executed every time the user logs into their system. Although the payload was unavailable during DomainTools’ investigation, they noted that it checks back with the delivery site (“docusign.sa[.]com/verification/c.php”).

When it does, the site triggers a browser refresh, leading to the delivery of a second-stage PowerShell script, which further downloads and executes a ZIP payload setting the URL parameter “an” to “2”. This step involves unpacking an executable named “jp2launcher.exe,” laying the groundwork for the installation of NetSupport RAT.

Complexity of the Attack Chain

The multi-layered approach of these scripts is likely a strategy to evade detection and increase resilience against security investigations and takedown efforts. The method of scripts downloading additional scripts creates a complex execution chain that’s challenging to trace.

Association with Past Campaigns

While the direct perpetrators of this scheme remain unidentified, DomainTools noted striking similarities in the delivery URLs, domain names, and registration patterns with a campaign linked to SocGholish (also known as FakeUpdates), which surfaced in October 2024.

It’s worth mentioning that while the NetSupport Manager is a legitimate administrative tool, its misuse as a RAT by various threat groups—including FIN7, Scarlet Goldfinch, and Storm-0408—affirms the ongoing risk posed by such attacks.

Closing Thoughts

As cyber threats continue to evolve, the methods of infiltration are becoming increasingly sophisticated. Users should remain vigilant against such tactics, maintaining updated security measures while being cautious of unsolicited links and requests for script execution. Staying informed about emerging threats is vital in safeguarding personal and professional digital environments.

spot_img

Related articles

Recent articles

Attackers Exploit Cloudflare Zero-Day to Bypass WAF Using ACME Certificate Validation

Understanding the Cloudflare Zero-Day Vulnerability In the rapidly evolving landscape of web security, vulnerabilities can pose significant risks to both service providers and their customers....

Language as Vulnerability: Unpacking the Google Gemini Calendar Exploit

Understanding the Google Gemini Vulnerability: A New Era of Cyber Threats Introduction to the Vulnerability In recent years, cybersecurity teams have devoted considerable efforts to strengthen...

Salalah Mills Opens $65 Million Bakery Plant in Khazaen Economic City

Bakery Manufacturing Plant Launches in Khazaen Economic City Introduction to the New Facility The Food Development Company, a key subsidiary of Salalah Mills Company, has recently...

Turning Insights Into Action

20 Jan From Insight to Action Join the pivotal event where security experts unite to lead the future. The Security Middle East Conference is emerging as...