Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Rivian will resume work at the Georgia factory, emails show

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack
Identity

Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack

userBy userJune 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 3, 2025Ravi LakshmananUS

Multi-stage power shell attack

Threat Hunter is using deceitful websites to warn new campaigns that will trick unsuspecting users into running malicious PowerShell scripts on their machines and infecting them with malware on net support rats.

The Domaintools Investigations (DTI) team said they have identified a “malicious multistage downloader PowerShell script” hosted on a Lure website poses as Gitcode and Docusign.

“These sites try to trick users into copying and running the first PowerShell script with the Windows Run command,” the company says in a technical report shared with Hacker News.

“In doing so, the PowerShell script will download another downloader script and run it on the system. This will get the additional payload and eventually install the net support rat on the infected machine.”

Cybersecurity

These counterfeit sites are believed to be possible to be propagated through email and social engineering attempts via social media platforms.

Hosted on fake Gitcode sites, PowerShell scripts are designed to download a set of intermediate PowerShell scripts from an external server (“cordingViewTool[.]com”) It is used continuously to fire net support rats on the victim machine.

domainools said it also identified several websites for Docusign’s spoofing (e.g. docusign.sa[.]com) Delivers the same remote access trojan, but with a twist: use Clickfix-style Captcha Verifications to use victims to run malicious Powershell scripts.

Like the recently documented attack chain that offers Eddiestealer Infostealer, users who land on the page are asked to prove that they are not robots by completing the check.

Multi-stage power shell attack

Triggering a Captcha validation will secretly copy obfuscated PowerShell commands to the user’s clipboard (a technology known as clipboard addiction).

The PowerShell script downloads Persistence Script (“wbdims.exe”) from GitHub and works, ensuring that the payload is automatically launched when the user logs in to the system.

“This payload has become unavailable during the investigation, but we are expected to check in to the delivery site via ‘docusign.sa.'[.]com/verification/c.php,” domainools said.[.]com/verification/s.php? an = 1. ‘”

This will deliver a two-stage PowerShell script and download and run a three-stage ZIP payload from the same server by setting the URL parameter “AN” to “2.” The script unpacks the archive and runs an executable file named “jp2launcher.exe” that resides within it, which ultimately leads to the deployment of the net support rat.

Cybersecurity

“The multiple stages of scripts that download and run download and run scripts are likely to be attempts to avoid detection and increase resilience through security investigations and takedowns,” the company said.

It is not clear who is currently behind the campaign, but Domaintools noted that they have identified similar distribution URLs, domain naming and registration patterns in connection with the Socgholish (Aka fakeUpdates) campaign detected in October 2024.

“The technologies involved are particularly common and NetSupport Managers are legitimate management tools known to be utilized as rats by multiple threat groups such as FIN7, Scarlet Goldfinch, and Storm-0408.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUkraine claims to have damaged the bridge to Crimea, which annexed Russian bridge | News of the Russian-Ukraine War
Next Article Impulse Space, a startup founded by former SpaceX engineers, raises $300 million to promote the future of orbital transport
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Rivian will resume work at the Georgia factory, emails show

Boulevard raises $80 million to power the self-care boom driven by Botox and GLP-1 surges

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.