
Risk actors have noticed the more and more not unusual ClickFix method to ship a far off get entry to trojan named NetSupport RAT since early January 2025.
NetSupport RAT, usually propagated by the use of bogus web pages and faux browser updates, grants attackers complete management over the sufferer’s host, permitting them to track the tool’s display in real-time, management the keyboard and mouse, add and obtain recordsdata, and release and execute malicious instructions.
At the beginning referred to as NetSupport Supervisor, it used to be advanced as a sound far off IT improve program, however has since been repurposed by means of malicious actors to focus on organizations and seize delicate knowledge, together with screenshots, audio, video, and recordsdata.
“ClickFix is a method utilized by risk actors to inject a pretend CAPTCHA webpage on compromised web pages, educating customers to practice positive steps to duplicate and execute malicious PowerShell instructions on their host to obtain and run malware payloads,” eSentire stated in an research.

Within the assault chains known by means of the cybersecurity corporate, the PowerShell command is used to obtain and execute the NetSupport RAT consumer from a far off server that hosts the malicious elements within the type of PNG symbol recordsdata.

The improvement comes because the ClickFix way could also be getting used to propagate an up to date model of the Lumma Stealer malware that makes use of the ChaCha20 cipher for decrypting a configuration record containing the record of command-and-control (C2) servers.
“Those adjustments supply perception into the evasive ways hired by means of the developer(s) who’re actively operating to bypass present extraction and research gear,” eSentire stated.