New malware campaign exploits fake Gitcode and DocuSign sites to deliver NetSupport RAT

New malware campaign exploits fake Gitcode and DocuSign sites to deliver NetSupport RAT

A sophisticated campaign is using fake websites to trick users into executing malicious PowerShell scripts, ultimately infecting their systems with the NetSupport Remote Access Trojan (RAT).

Researchers from the DomainTools Investigations (DTI) team said that the malicious scripts are hosted on fake sites impersonating popular services such as Gitcode and DocuSign. The lure sites prompt users to run a PowerShell command via the Windows Run dialog, initiating a multi-stage infection chain.

The initial script downloads another PowerShell downloader, which then retrieves additional payloads and installs the NetSupport RAT, the researchers explained.

Some of the fake DocuSign pages deploy a deceptive CAPTCHA verification process. When users complete the check, a technique known as clipboard poisoning secretly copies a hidden PowerShell command to their clipboard. They are then instructed to paste it into the Run window, unknowingly executing the malware.

The campaign appears to rely heavily on social engineering tactics via email and social media to draw victims to the malicious domains, such as docusign.sa[.]com. The PowerShell scripts downloaded from the sites establish persistence through a file named wbdims.exe, likely hosted on GitHub, though it was unavailable at the time of analysis.

Further stages of the attack involve fetching additional scripts and payloads from the spoofed DocuSign domain, resulting in the download and execution of jp2launcher.exe, which deploys the NetSupport RAT.

While it’s unclear what threat actor is behind the campaign, researchers noted similarities in infrastructure and tactics with the SocGholish (FakeUpdates) malware campaign observed in late 2024. Furthermore, NetSupport Manager, though a legitimate remote administration tool, has frequently been co-opted by threat actors including FIN7, Scarlet Goldfinch, and Storm-0408 for malicious purposes.

Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025