InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Technology

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

November 17, 2025 4 Min Read
Share
New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
SHARE

Cybersecurity researchers discovered a malware campaign deploying Amatera Stealer and NetSupport RATs using the now popular ClickFix social engineering tactic.

This activity observed this month is tracked by eSentire under the following names: evaluation.

First discovered in June 2025, Amatera is believed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available in a malware-as-a-service (MaaS) model until malware sales ceased in mid-July 2024. Amatera is available through subscription plans ranging from $199 per month to $1,499 per year.

“Amatera provides threat actors with extensive data exfiltration capabilities across crypto wallets, browsers, messaging applications, FTP clients, and email services,” the Canadian cybersecurity vendor said. “Specifically, Amatera employs advanced evasion techniques such as WoW64 SysCalls to evade user-mode hooking mechanisms commonly used by sandboxes, antivirus solutions, and EDR products.”

As is often the case with ClickFix attacks, users are tricked into using the Windows Run dialog to run malicious commands and complete reCAPTCHA validation checks on a fake phishing page. This command starts a multi-step process that uses the “mshta.exe” binary to launch a PowerShell script that downloads the .NET downloaded from the file hosting service MediaFire.

The payload is an Amatera Stealer DLL packed using PureCrypter. PureCrypter is a C#-based multifunctional crypter and loader that is also promoted as a MaaS product by a threat actor named PureCoder. The DLL is injected into the ‘MSBuild.exe’ process and the stealer then collects sensitive data, connects to an external server and executes PowerShell commands, and fetches and executes the NetSupport RAT.

“Of particular note in the PowerShell invoked by Amatera are checks to determine if the victim’s machine is part of a domain or has files of potential value (such as a crypto wallet),” eSentire said. “If neither is found, NetSupport will not be downloaded.”

See also  UNC1549 Hacking 34 devices from 11 telecom companies via LinkedIn Job Lures and Minibike malware

This development coincides with the discovery of several phishing campaigns propagating various malware families.

  • Email containing a Visual Basic script attachment disguised as an invoice to deliver an XWorm using a batch script that calls a PowerShell loader
  • A compromised website injected with malicious JavaScript redirects site visitors to a fake ClickFix page that mimics a Cloudflare Turnstile check and delivers the NetSupport RAT as part of an ongoing campaign codenamed SmartApeSG (also known as HANEYMANEY and ZPHP).
  • It uses a fake Booking.com site to display a fake CAPTCHA check and uses a ClickFix lure to run a malicious PowerShell command that drops a credential stealer when run from the Windows Run dialog.
  • Emails that disguise internal “email delivery” notifications. It falsely claims to have blocked important messages related to unpaid invoices, package deliveries, or requests for quotation (RFQ) and siphons login credentials under the pretext of tricking recipients into clicking on a link and moving the message to their inbox.
  • Attacks using phishing kits named Cephas (first appeared in August 2024) and Tycoon 2FA to lure users to a malicious login page and steal their credentials.

“What makes Cephas notable is that it implements unique and unusual obfuscation techniques,” Barracuda said in an analysis published last week. “The kit hides the code by creating random invisible characters within the source code, evading anti-phishing scanners and preventing signature-based YARA rules from matching accurate phishing techniques.”

Share This Article
Twitter Copy Link
Previous Article If you love LA Noire and Amnesia, buy Lovecraftian detective RPG The Sinking City for just $12 If you love LA Noire and Amnesia, buy Lovecraftian detective RPG The Sinking City for just $12
Next Article Department of Justice files suit to block California law regulating unidentified masked law enforcement officers Department of Justice files suit to block California law regulating unidentified masked law enforcement officers

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Europol dismantles SIM farm network running 49 million fake accounts worldwide
Technology

Europol dismantles SIM farm network running 49 million fake accounts worldwide

4 Min Read
GPT-5 agent that automatically detects and fixes code defects
Technology

GPT-5 agent that automatically detects and fixes code defects

3 Min Read
Malicious VSX extension 'SleepyDuck' uses Ethereum to keep command server alive
Technology

Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive

4 Min Read
Russian hackers create 4,300 fake travel websites to steal hotel guests' payment data
Technology

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?