Cybersecurity researchers discovered a malware campaign deploying Amatera Stealer and NetSupport RATs using the now popular ClickFix social engineering tactic.
This activity observed this month is tracked by eSentire under the following names: evaluation.
First discovered in June 2025, Amatera is believed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available in a malware-as-a-service (MaaS) model until malware sales ceased in mid-July 2024. Amatera is available through subscription plans ranging from $199 per month to $1,499 per year.
“Amatera provides threat actors with extensive data exfiltration capabilities across crypto wallets, browsers, messaging applications, FTP clients, and email services,” the Canadian cybersecurity vendor said. “Specifically, Amatera employs advanced evasion techniques such as WoW64 SysCalls to evade user-mode hooking mechanisms commonly used by sandboxes, antivirus solutions, and EDR products.”
As is often the case with ClickFix attacks, users are tricked into using the Windows Run dialog to run malicious commands and complete reCAPTCHA validation checks on a fake phishing page. This command starts a multi-step process that uses the “mshta.exe” binary to launch a PowerShell script that downloads the .NET downloaded from the file hosting service MediaFire.
The payload is an Amatera Stealer DLL packed using PureCrypter. PureCrypter is a C#-based multifunctional crypter and loader that is also promoted as a MaaS product by a threat actor named PureCoder. The DLL is injected into the ‘MSBuild.exe’ process and the stealer then collects sensitive data, connects to an external server and executes PowerShell commands, and fetches and executes the NetSupport RAT.

“Of particular note in the PowerShell invoked by Amatera are checks to determine if the victim’s machine is part of a domain or has files of potential value (such as a crypto wallet),” eSentire said. “If neither is found, NetSupport will not be downloaded.”
This development coincides with the discovery of several phishing campaigns propagating various malware families.
- Email containing a Visual Basic script attachment disguised as an invoice to deliver an XWorm using a batch script that calls a PowerShell loader
- A compromised website injected with malicious JavaScript redirects site visitors to a fake ClickFix page that mimics a Cloudflare Turnstile check and delivers the NetSupport RAT as part of an ongoing campaign codenamed SmartApeSG (also known as HANEYMANEY and ZPHP).
- It uses a fake Booking.com site to display a fake CAPTCHA check and uses a ClickFix lure to run a malicious PowerShell command that drops a credential stealer when run from the Windows Run dialog.
- Emails that disguise internal “email delivery” notifications. It falsely claims to have blocked important messages related to unpaid invoices, package deliveries, or requests for quotation (RFQ) and siphons login credentials under the pretext of tricking recipients into clicking on a link and moving the message to their inbox.
- Attacks using phishing kits named Cephas (first appeared in August 2024) and Tycoon 2FA to lure users to a malicious login page and steal their credentials.
“What makes Cephas notable is that it implements unique and unusual obfuscation techniques,” Barracuda said in an analysis published last week. “The kit hides the code by creating random invisible characters within the source code, evading anti-phishing scanners and preventing signature-based YARA rules from matching accurate phishing techniques.”