InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT
Technology

Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

December 8, 2025 6 Min Read
Share
Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT
SHARE

Cybersecurity researchers say, “ JS#Smuggler It has been observed using compromised websites as a distribution vector for a remote access Trojan named NetSupport RAT.

The attack chain analyzed by Securonix includes three main moving parts: an obfuscated JavaScript loader injected into a website, an HTML application (HTA) that uses ‘mshta.exe’ to run an encrypted PowerShell stager, and a PowerShell payload designed to download and execute the primary malware.

Researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said, “NetSupport RAT allows attackers complete control over a victim host, including remote desktop access, file manipulation, command execution, data theft, and proxy functionality.”

At this stage, there is little evidence linking this campaign to any known threat groups or countries. This activity was found to target corporate users through compromised websites, indicating a widespread effort.

The cybersecurity firm described it as a multi-stage web-based malware operation that uses hidden iframes, obfuscated loaders, and layered script execution for malware deployment and remote control.

In these attacks, silent redirects embedded in infected websites act as a conduit for a highly scrambled JavaScript loader (“phone.js”) obtained from an external domain that profiles the device and determines whether to serve a full-screen iframe (if accessed from a mobile phone) or load another remote second-stage script (if accessed from a desktop).

The invisible iframe is designed to redirect victims to a malicious URL. The JavaScript loader has a built-in tracking mechanism that minimizes the chance of detection by ensuring that malicious logic is only invoked once, upon first access.

“This device-aware bifurcation allows attackers to tailor infection vectors, hide malicious activity from specific environments, and maximize success rates by delivering platform-appropriate payloads while avoiding unnecessary exposure,” the researchers said.

See also  North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

The remote script downloaded during the first stage of the attack lays the groundwork by constructing a URL where, upon execution, the HTA payload is downloaded and executed using ‘mshta.exe’. The HTA payload is another loader for a temporary PowerShell stager that is written to disk, decrypted, and executed directly in memory to avoid detection.

Additionally, the HTA file is secretly executed by disabling all visible window elements and minimizing the application upon startup. Once the decrypted payload is executed, it also takes steps to remove the PowerShell stager from disk and terminate itself with as little forensic trace as possible.

The primary purpose of the decrypted PowerShell payload is to retrieve and deploy the NetSupport RAT, giving the attacker complete control over the compromised host.

“Sophisticated, multi-layered evasion techniques strongly indicate that a professional malware framework is actively maintained,” Securonix said. “Defenders must deploy strong CSP enforcement, script monitoring, PowerShell logging, mshta.exe restrictions, and behavioral analysis to effectively detect such attacks.”

CHAMELEON#NET delivers Formbook malware

The disclosure comes weeks after the company also detailed another multi-stage malspam campaign called CHAMELEON#NET that used phishing emails to deliver Formbook, a keylogger and information theft tool. This email message aims to lure victims of the National Social Security Department into downloading a seemingly harmless archive by obtaining their credentials on a fake webmail portal designed for this purpose.

“The campaign begins with a phishing email that tricks users into downloading a .BZ2 archive, starting a multi-step infection chain,” Sangwan said. “The initial payload is a highly obfuscated JavaScript file that acts as a dropper and leads to the execution of a complex VB.NET loader. This loader uses advanced reflection and a custom conditional XOR cipher to decrypt and execute the final payload, the Formbook RAT, completely in memory.”

Specifically, the JavaScript dropper decodes two additional JavaScript files and writes them to disk in the %TEMP% directory.

  • svchost.js: Drops a .NET loader executable called DarkTortilla (‘QNaZg.exe’). This is a crypter often used to distribute next stage payloads.
  • adobe.js: Drop a file named “PHat.jar”. This is an MSI installer package that behaves similarly to ‘svchost.js’.
See also  Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks

In this campaign, the loader is configured to decrypt and execute the embedded DLL, Formbook malware. Persistence is achieved by adding it to the Windows startup folder so that it starts automatically when the system restarts. Alternatively, also manage persistence through the Windows Registry.

“Those attackers have successfully used a combination of social engineering, advanced script obfuscation, and advanced .NET evasion techniques to successfully compromise their targets,” Securonix said. “By using a custom decryption routine followed by reflective loading, the final payload can be executed fileless, significantly increasing the complexity of detection and forensic analysis.”

Share This Article
Twitter Copy Link
Previous Article Mount and Blade 2 Bannerlord and its new DLC hit an all-time low price, but not for long Mount and Blade 2 Bannerlord and its new DLC hit an all-time low price, but not for long
Next Article D.C. Police Chief Pamela Smith will resign, mayor announces D.C. Police Chief Pamela Smith will resign, mayor announces

Latest News

Spyware alerts, Mirai Strikes, Docker leaks, ValleyRAT rootkits — 20 more stories

Spyware alerts, Mirai Strikes, Docker leaks, ValleyRAT rootkits — 20 more stories

This week's cyber articles show how quickly the online world…

December 11, 2025
React2Shell exploit delivers crypto miners and new malware across multiple sectors

React2Shell exploit delivers crypto miners and new malware across multiple sectors

React2 shell Threat actors continue to witness large-scale exploitation of…

December 10, 2025
North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

North Korean-linked attackers may have become the latest attackers to…

December 9, 2025
Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

Cybersecurity researchers say, “ JS#Smuggler It has been observed using…

December 8, 2025
React2Shell critical flaw added to CISA KEV after active exploitation

React2Shell critical flaw added to CISA KEV after active exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday…

December 7, 2025

You Might Also Like

Evolution of UTA0388 espionage malware
Technology

Evolution of UTA0388 espionage malware

5 Min Read
Quantum Hacks to AI Defenses
Technology

From quantum hacks to AI defense – an expert guide to building unbreakable cyber resilience

7 Min Read
New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs
Technology

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

3 Min Read
DPRK hackers use Clickfix to deliver Beavertail malware with Crypto Job Scams
Technology

DPRK hackers use Clickfix to deliver Beavertail malware with Crypto Job Scams

12 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?