Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites

Posted on July 8, 2025July 8, 2025 By CWS

Safety researchers have uncovered a complicated cyberattack marketing campaign leveraging compromised WordPress web sites to distribute the NetSupport Distant Entry Trojan via an progressive social engineering technique dubbed “ClickFix.”

The Cybereason International Safety Operations Heart (GSOC) found the marketing campaign in Might 2025, revealing how menace actors are weaponizing professional distant entry instruments to realize unauthorized management over sufferer computer systems.

The assault represents a major evolution in cybercriminal techniques, combining web site compromise with psychological manipulation to bypass fashionable safety defenses.

Multi-Stage Assault Chain

The marketing campaign begins with phishing emails, PDF attachments, or malicious hyperlinks posted on gaming web sites that redirect customers to compromised WordPress websites.

As soon as guests land on these contaminated pages, malicious JavaScript code hidden within the web site’s meta description routinely hundreds and executes a distant script known as “j.js” from the area islonline.org.

“The attackers are particularly focusing on Home windows customers and have in-built mechanisms to keep away from detection,” stated cybersecurity analysts aware of the investigation.

The malicious script first identifies the person’s working system and browser particulars, then checks in the event that they’ve visited the positioning earlier than utilizing native storage monitoring to attenuate publicity.

Assault Chain

Probably the most progressive side of the assault includes what researchers name the “ClickFix” method.

After the preliminary an infection, victims are offered with a pretend CAPTCHA verification web page that seems professional, full with fashionable styling utilizing React frameworks and TailwindCSS.

Nevertheless, as an alternative of verifying human interplay, the web page secretly copies a malicious PowerShell command to the person’s clipboard.

Clipboard Hijacking Deception

The pretend CAPTCHA then instructs customers to press Home windows + R and paste the “verification code” into the Run dialog field.

Believing they’re finishing a typical safety verify, victims unknowingly execute a command that downloads and installs the NetSupport Shopper software program.

“This system is especially insidious as a result of it exploits person familiarity with CAPTCHA challenges whereas bypassing browser safety controls,” defined safety researchers.

clickfix assault chain

“The person themselves carry out the ultimate execution step, evading automated detection methods.” As soon as put in, the NetSupport Shopper establishes a persistent connection to command-and-control servers situated in Moldova.

The malware creates registry entries for persistence and may survive system reboots, permitting attackers to keep up long-term entry to compromised methods.

Publish-An infection Actions

Inside hours of a profitable compromise, menace actors have been noticed conducting reconnaissance actions, together with querying Lively Listing for area computer systems and transferring information to public directories.

The attackers use NetSupport’s professional distant command immediate characteristic to execute instructions reminiscent of “web group /area ‘Area Computer systems’” to map the community infrastructure.

In line with menace intelligence information, NetSupport Supervisor ranked because the seventh most prevalent menace in 2024, with cybercriminals more and more favoring professional instruments to mix malicious actions with regular IT operations.

Safety consultants advocate quick isolation of affected methods, password resets for compromised accounts, and blocking of recognized malicious domains and IP addresses.

Organizations must also implement monitoring for uncommon PowerShell exercise and clipboard manipulation in browser contexts.

“The secret is recognizing that any instruction requiring customers to stick instructions into Home windows Run dialogs must be handled as extremely suspicious,” safety researchers emphasised.

Web site directors are suggested to recurrently audit WordPress themes and plugins for unauthorized script injections.

The marketing campaign highlights the evolving menace panorama the place attackers more and more depend on social engineering quite than technical exploits to attain their targets.

Unique Webinar Alert: Harnessing Intel® Processor Improvements for Superior API Safety – Register for Free

Cyber Security News Tags:ClickFix, Compromised, Deploy, Hackers, NetSupport, RAT, Sites, Technique, WordPress

Post navigation

Previous Post: 5 Ways Identity-based Attacks Are Breaching Retail
Next Post: Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

Related Posts

FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign Cyber Security News
BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral Cyber Security News
Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict Cyber Security News
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
CISOs Role in Driving Secure Digital Transformation Cyber Security News
Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Adobe Patches Critical Code Execution Bugs
  • Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025
  • Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Adobe Patches Critical Code Execution Bugs
  • Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025
  • Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News