InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Technology

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

November 17, 2025 4 Min Read
Share

Cybersecurity researchers discovered a malware campaign deploying Amatera Stealer and NetSupport RATs using the now popular ClickFix social engineering tactic.

This activity observed this month is tracked by eSentire under the following names: evaluation.

First discovered in June 2025, Amatera is believed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available in a malware-as-a-service (MaaS) model until malware sales ceased in mid-July 2024. Amatera is available through subscription plans ranging from $199 per month to $1,499 per year.

“Amatera provides threat actors with extensive data exfiltration capabilities across crypto wallets, browsers, messaging applications, FTP clients, and email services,” the Canadian cybersecurity vendor said. “Specifically, Amatera employs advanced evasion techniques such as WoW64 SysCalls to evade user-mode hooking mechanisms commonly used by sandboxes, antivirus solutions, and EDR products.”

As is often the case with ClickFix attacks, users are tricked into using the Windows Run dialog to run malicious commands and complete reCAPTCHA validation checks on a fake phishing page. This command starts a multi-step process that uses the “mshta.exe” binary to launch a PowerShell script that downloads the .NET downloaded from the file hosting service MediaFire.

The payload is an Amatera Stealer DLL packed using PureCrypter. PureCrypter is a C#-based multifunctional crypter and loader that is also promoted as a MaaS product by a threat actor named PureCoder. The DLL is injected into the ‘MSBuild.exe’ process and the stealer then collects sensitive data, connects to an external server and executes PowerShell commands, and fetches and executes the NetSupport RAT.

“Of particular note in the PowerShell invoked by Amatera are checks to determine if the victim’s machine is part of a domain or has files of potential value (such as a crypto wallet),” eSentire said. “If neither is found, NetSupport will not be downloaded.”

See also  Google's AI defenses built into Android now block 10 billion fraudulent messages per month

This development coincides with the discovery of several phishing campaigns propagating various malware families.

  • Email containing a Visual Basic script attachment disguised as an invoice to deliver an XWorm using a batch script that calls a PowerShell loader
  • A compromised website injected with malicious JavaScript redirects site visitors to a fake ClickFix page that mimics a Cloudflare Turnstile check and delivers the NetSupport RAT as part of an ongoing campaign codenamed SmartApeSG (also known as HANEYMANEY and ZPHP).
  • It uses a fake Booking.com site to display a fake CAPTCHA check and uses a ClickFix lure to run a malicious PowerShell command that drops a credential stealer when run from the Windows Run dialog.
  • Emails that disguise internal “email delivery” notifications. It falsely claims to have blocked important messages related to unpaid invoices, package deliveries, or requests for quotation (RFQ) and siphons login credentials under the pretext of tricking recipients into clicking on a link and moving the message to their inbox.
  • Attacks using phishing kits named Cephas (first appeared in August 2024) and Tycoon 2FA to lure users to a malicious login page and steal their credentials.

“What makes Cephas notable is that it implements unique and unusual obfuscation techniques,” Barracuda said in an analysis published last week. “The kit hides the code by creating random invisible characters within the source code, evading anti-phishing scanners and preventing signature-based YARA rules from matching accurate phishing techniques.”

Share This Article
Twitter Copy Link
Previous Article If you love LA Noire and Amnesia, buy Lovecraftian detective RPG The Sinking City for just $12 If you love LA Noire and Amnesia, buy Lovecraftian detective RPG The Sinking City for just $12
Next Article Department of Justice files suit to block California law regulating unidentified masked law enforcement officers Department of Justice files suit to block California law regulating unidentified masked law enforcement officers

You Might Also Like

Zero-click agent browser attack could delete entire Google Drive using crafted email
Technology

Zero-click agent browser attack could delete entire Google Drive using crafted email

5 Min Read
Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Technology

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation

2 Min Read
North Korean hacker lures defense engineer with fake job to steal drone secrets
Technology

North Korean hacker lures defense engineer with fake job to steal drone secrets

4 Min Read
Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload
Technology

Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?