Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Posted on June 3, 2025June 3, 2025 By CWS

Jun 03, 2025Ravie LakshmananUnited States
Risk hunters are alerting to a brand new marketing campaign that employs misleading web sites to trick unsuspecting customers into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware.
The DomainTools Investigations (DTI) crew stated it recognized “malicious multi-stage downloader Powershell scripts” hosted on lure web sites that masquerade as Gitcode and DocuSign.
“These websites try to deceive customers into copying and operating an preliminary PowerShell script on their Home windows Run command,” the corporate stated in a technical report shared with The Hacker Information.
“Upon doing so, the powershell script downloads one other downloader script and executes on the system, which in flip retrieves further payloads and executes them finally putting in NetSupport RAT on the contaminated machines.”

It is believed that these counterfeit websites could also be propagated by way of social engineering makes an attempt over electronic mail and/or social media platforms.
The PowerShell scripts current hosted on the faux Gitcode websites are designed to obtain a sequence of intermediate PowerShell scripts from an exterior server (“tradingviewtool[.]com”) which might be utilized in succession to launch NetSupport RAT on sufferer machines.
DomainTools stated it additionally recognized a number of web sites spoofing Docusign (e.g., docusign.sa[.]com) to ship the identical distant entry trojan however with a twist: Utilizing ClickFix-style CAPTCHA verifications to dupe victims into operating the malicious PowerShell script.
Just like the not too long ago documented assault chains delivering the EDDIESTEALER infostealer, customers who land on the pages are requested to show they aren’t a robotic by finishing the verify.

Triggering the CAPTCHA verification causes an obfuscated PowerShell command to be clandestinely copied to the person’s clipboard — a way known as clipboard poisoning — after which they’re instructed to launch the Home windows Run dialog (“Win + R”), paste (“CTRL + V”), and press Enter, inflicting the script to be executed within the course of.
The PowerShell script works by downloading a persistence script (“wbdims.exe”) from GitHub to make sure that the payload is launched robotically when the person logs in to the system.
“Whereas this payload was now not accessible through the time of investigation, the expectation is that it checks in with the supply website by way of ‘docusign.sa[.]com/verification/c.php,'” DomainTools stated. “Upon doing so, it triggers a refresh within the browser for the web page to show the content material of ‘docusign.sa[.]com/verification/s.php?an=1.'”
This leads to the supply of a second-stage PowerShell script, which then downloads and executes a third-stage ZIP payload from the identical server by setting the URL parameter “an” to “2.” The script proceeds to unpack the archive and run an executable named “jp2launcher.exe” current inside it, in the end resulting in the deployment of NetSupport RAT.

“The a number of levels of scripts downloading and operating scripts that obtain and run but extra scripts is probably going an try to evade detection and be extra resilient to safety investigations and takedowns,” the corporate stated.
It is at present not clear who’s behind the marketing campaign, however DomainTools identified that it recognized comparable supply URL, area naming, and registration patterns in reference to a SocGholish (aka FakeUpdates) marketing campaign detected in October 2024.
“Notably, the strategies concerned are commonplace and NetSupport Supervisor is a professional administration software identified to be leveraged as a RAT by a number of menace teams similar to FIN7, Scarlet Goldfinch, Storm-0408, and others.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attack, Docusign, Fake, Gitcode, MultiStage, NetSupport, PowerShell, RAT, Sites, Spread

Post navigation

Previous Post: Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones
Next Post: Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation

Related Posts

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign The Hacker News
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News
Assessing the Role of AI in Zero Trust Assessing the Role of AI in Zero Trust The Hacker News
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News