Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Posted on November 14, 2025November 14, 2025 By CWS

The SmartApeSG marketing campaign, also referred to as ZPHP or HANEY MANEY, continues to evolve its assault strategies to compromise Home windows methods with malicious distant entry instruments.

First reported in June 2024, this marketing campaign has shifted from utilizing pretend browser replace pages to deploying subtle ClickFix-style methods.

The brand new strategy tips customers into pondering they should confirm their id by means of a pretend CAPTCHA web page, making the assault extra misleading and more durable to detect.

The marketing campaign primarily targets customers who go to compromised web sites displaying hidden malicious scripts. When sure circumstances are met, these scripts activate and current customers with a pretend “confirm you’re human” field.

Injected SmartApeSG script in a web page from the compromised website (Supply – Web Storm Heart)

The attackers use this intelligent approach to bypass consumer suspicion and trick them into taking actions that result in malware set up.

As soon as activated, the pretend CAPTCHA web page initiates a sequence of occasions designed to put in NetSupport RAT on the sufferer’s laptop.

Pretend CAPTCHA web page displayed by the compromised website (Supply – Web Storm Heart)

This distant entry device offers attackers full management over contaminated machines, permitting them to steal knowledge, monitor exercise, and deploy extra malware.

Web Storm Heart safety analysts recognized that the assault works by injecting malicious content material immediately right into a consumer’s clipboard after they click on the verification field.

The injected content material is a command string that makes use of the mshta command to retrieve and execute malicious code from attacker-controlled servers.

Multi-stage strategy

This method is especially efficient as a result of it bypasses conventional safety measures by counting on social engineering moderately than software program vulnerabilities.

The persistence mechanism operates by means of a intelligent Home windows trick. The malicious NetSupport RAT bundle maintains itself on contaminated computer systems by making a Begin Menu shortcut that runs a JavaScript file saved within the AppDataLocalTemp listing.

This JavaScript file then launches the precise NetSupport RAT executable situated within the C:ProgramData listing. This multi-stage strategy makes detection and elimination tougher for typical customers.

What makes SmartApeSG significantly harmful is the fixed evolution of its infrastructure. The domains, command and management servers, and malware packages change almost every day, making menace intelligence updates vital for safety groups.

Organizations ought to educate customers about clicking verification bins on web sites and implement network-level protections to dam connections to recognized malicious domains related to this marketing campaign.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Campaign, ClickFix, Deploy, Leverages, NetSupport, RAT, SmartApeSG, Technique

Post navigation

Previous Post: Checkout.com Discloses Data Breach After Extortion Attempt
Next Post: NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation

Related Posts

Denodo Scheduler Vulnerability Let Attackers Execute Remote Code Cyber Security News
FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation Cyber Security News
DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack Cyber Security News
Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News