Cyber attackers are abusing the ClickFix method to distribute NetSupport RAT by tricking users with fake CAPTCHA pages into executing PowerShell commands. This malware gives attackers full control over compromised systems, highlighting the need for vigilance against deceptive browser prompts.
Key takeaways:
🔗 Fake CAPTCHA: Malicious websites masquerade as CAPTCHA checks to execute harmful PowerShell scripts.
🖥️ Malware Capabilities: NetSupport RAT allows attackers to remotely control devices, including screen monitoring and file manipulation.
🔍 Prevalence: Over 6,000 WordPress sites have been compromised in recent ClickFix campaigns.
🛡️ Security Advice: Users should be cautious of unexpected browser updates or CAPTCHA prompts and ensure they're on legitimate sites.
iocs.txt
: List of all Indicators of Compromise (IOCs) in the article.endpoint-iocs.txt
: List of endpoint IOCs in the article.network-iocs.txt
: List of network IOCs in the article.
Note
Use the following scripts in threat-hunting-scripts to help you hunt:
verify-iocs-vt.py
: Verify IOCs using VirusTotal Community API.iocs-to-cs.py
: Upload IOCs to CrowdStrike Falcon IOC Management for detection and blocking.