newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack
Technology

Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack

June 3, 2025 4 Min Read
Share
Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack
SHARE

Threat Hunter is using deceitful websites to warn new campaigns that will trick unsuspecting users into running malicious PowerShell scripts on their machines and infecting them with malware on net support rats.

The Domaintools Investigations (DTI) team said they have identified a “malicious multistage downloader PowerShell script” hosted on a Lure website poses as Gitcode and Docusign.

“These sites try to trick users into copying and running the first PowerShell script with the Windows Run command,” the company says in a technical report shared with Hacker News.

“In doing so, the PowerShell script will download another downloader script and run it on the system. This will get the additional payload and eventually install the net support rat on the infected machine.”

These counterfeit sites are believed to be possible to be propagated through email and social engineering attempts via social media platforms.

Hosted on fake Gitcode sites, PowerShell scripts are designed to download a series of intermediate PowerShell scripts from an external server (“TradingViewTool(.)com”) that is used consecutively to launch net support rats on the victim machine.

Domaintools has also identified several websites (docusign.sa(.)com) that spoof Docusign to provide the same remote access Trojan, but with a twist, using Clickfix-style Captcha validation to run malicious PowerShell scripts using victims on dupe victims.

Like the recently documented attack chain that offers Eddiestealer Infostealer, users who land on the page are asked to prove that they are not robots by completing the check.

Multi-stage power shell attack

Triggering a Captcha validation will secretly copy obfuscated PowerShell commands to the user’s clipboard (a technology known as clipboard addiction).

See also  Why traditional DLP solutions fail in the browser era

The PowerShell script downloads Persistence Script (“wbdims.exe”) from GitHub and works, ensuring that the payload is automatically launched when the user logs in to the system.

“This payload has become unavailable during the investigation, but what we can expect is to check in to the delivery site via ‘docusign.sa(.)com/verification/c.php’,” Domaintools said. “Thus, it will trigger an update in the page’s browser and display the content in ‘docusign.sa(.)com/verification/s.php?an = 1.” ”’ ”com/verification/s.php.”

This will deliver a two-stage PowerShell script and download and run a three-stage ZIP payload from the same server by setting the URL parameter “AN” to “2.” The script unpacks the archive and runs an executable file named “jp2launcher.exe” that resides within it, which ultimately leads to the deployment of the net support rat.

“The multiple stages of scripts that download and run download and run scripts are likely to be attempts to avoid detection and increase resilience through security investigations and takedowns,” the company said.

It is not clear who is currently behind the campaign, but Domaintools noted that they have identified similar distribution URLs, domain naming and registration patterns in connection with the Socgholish (Aka fakeUpdates) campaign detected in October 2024.

“The technologies involved are particularly common and NetSupport Managers are legitimate management tools known to be utilized as rats by multiple threat groups such as FIN7, Scarlet Goldfinch, and Storm-0408.”

Share This Article
Facebook Twitter Copy Link
Previous Article Get nvidiageforce RTX5090 graphics card for you and friends Get nvidiageforce RTX5090 graphics card for you and friends
Next Article How to stop the AI ​​drawing of iPhone in a past era How to stop the AI ​​drawing of iPhone in a past era
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Fake recruiters email target CFOs using legal netbird tools in six global regions
Technology

Fake recruiters email target CFOs using legal netbird tools in six global regions

9 Min Read
Microsoft Discovery: How AI Agents Accelerate Scientific Discovery
Technology

Microsoft Discovery: How AI Agents Accelerate Scientific Discovery

9 Min Read
Cryptojacking campaign explores the DevOps API using ready-made tools from GitHub
Technology

Cryptojacking campaign explores the DevOps API using ready-made tools from GitHub

6 Min Read
How PHI-4 Renersing redefines AI reasoning by challenging the “Bigger Better” myth
Technology

How PHI-4 Renersing redefines AI reasoning by challenging the “Bigger Better” myth

11 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?