Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

Posted on November 17, 2025November 17, 2025 By CWS

Nov 17, 2025Ravie Lakshmanan
Cybersecurity researchers have found malware campaigns utilizing the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT.
The exercise, noticed this month, is being tracked by eSentire beneath the moniker EVALUSION.
First noticed in June 2025, Amatera is assessed to be an evolution of ACR (brief for “AcridRain”) Stealer, which was obtainable beneath the malware-as-a-service (MaaS) mannequin till gross sales of the malware have been suspended in mid-July 2024. Amatera is accessible for buy through subscription plans that go from $199 monthly to $1,499 for a 12 months.

“Amatera gives menace actors with intensive information exfiltration capabilities concentrating on crypto-wallets, browsers, messaging functions, FTP purchasers, and e-mail companies,” the Canadian cybersecurity vendor mentioned. “Notably, Amatera employs superior evasion strategies similar to WoW64 SysCalls to avoid user-mode hooking mechanisms generally utilized by sandboxes, Anti-Virus options, and EDR merchandise.”

As is usually the case with ClickFix assaults, customers are tricked into executing malicious instructions utilizing the Home windows Run dialog so as to full a reCAPTCHA verification test on bogus phishing pages. The command initiates a multi-step course of that entails utilizing the “mshta.exe” binary to launch a PowerShell script that is answerable for downloading a .NET downloaded from MediaFire, a file internet hosting service.
The payload is the Amatera Stealer DLL packed utilizing PureCrypter, a C#-based multi-functional crypter and loader that is additionally marketed as a MaaS providing by a menace actor named PureCoder. The DLL is injected into the “MSBuild.exe” course of, following which the stealer harvests delicate information and contacts an exterior server to execute a PowerShell command to fetch and run NetSupport RAT.

“What is especially noteworthy within the PowerShell invoked by Amatera is a test to find out if the sufferer machine is a part of a site or has information of potential worth, e.g., crypto wallets,” eSentire mentioned. “If neither is discovered, NetSupport shouldn’t be downloaded.”
The event dovetails with the invention of a number of phishing campaigns propagating a variety of malware households –

Emails containing Visible Primary Script attachments that masqueraded as invoices to ship XWorm by the use of a batch script that invokes a PowerShell loader
Compromised web sites injected with malicious JavaScript that redirects web site guests to bogus ClickFix pages mimicking Cloudflare Turnstile checks to ship NetSupport RAT as a part of an ongoing marketing campaign codenamed SmartApeSG (aka HANEYMANEY and ZPHP)
Utilizing faux Reserving.com websites to show faux CAPTCHA checks that make use of ClickFix lures to run a malicious PowerShell command that drops a credential stealer when executed through the Home windows Run dialog
Emails spoofing inner “e-mail supply” notifications that falsely declare to have blocked necessary messages associated to excellent invoices, package deal deliveries, and Request for Quotations (RFQs) so as to trick recipients into clicking on a hyperlink that siphons login credentials beneath the pretext of shifting the messages to the inbox
Assaults utilizing phishing kits named Cephas (which first emerged in August 2024) and Tycoon 2FA to steer customers to malicious login pages for credential theft

“What makes Cephas noteworthy is that it implements a particular and unusual obfuscation method,” Barracuda mentioned in an evaluation revealed final week. “The package obscures its code by creating random invisible characters inside the supply code that assist it evade anti-phishing scanners and hinder signature-based YARA guidelines from matching the precise phishing strategies.”

The Hacker News Tags:Amatera, Campaign, ClickFix, Delivers, EVALUSION, NetSupport, RAT, Stealer

Post navigation

Previous Post: Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea
Next Post: Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants

Related Posts

Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts The Hacker News
FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users The Hacker News
North Korean Hackers Exploit VS Code for New Malware North Korean Hackers Exploit VS Code for New Malware The Hacker News
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity The Hacker News
Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp The Hacker News
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark