New malware campaign exploits fake Gitcode and DocuSign sites to deliver NetSupport RAT

New malware campaign exploits fake Gitcode and DocuSign sites to deliver NetSupport RAT

A sophisticated campaign is using fake websites to trick users into executing malicious PowerShell scripts, ultimately infecting their systems with the NetSupport Remote Access Trojan (RAT).

Researchers from the DomainTools Investigations (DTI) team said that the malicious scripts are hosted on fake sites impersonating popular services such as Gitcode and DocuSign. The lure sites prompt users to run a PowerShell command via the Windows Run dialog, initiating a multi-stage infection chain.

The initial script downloads another PowerShell downloader, which then retrieves additional payloads and installs the NetSupport RAT, the researchers explained.

Some of the fake DocuSign pages deploy a deceptive CAPTCHA verification process. When users complete the check, a technique known as clipboard poisoning secretly copies a hidden PowerShell command to their clipboard. They are then instructed to paste it into the Run window, unknowingly executing the malware.

The campaign appears to rely heavily on social engineering tactics via email and social media to draw victims to the malicious domains, such as docusign.sa[.]com. The PowerShell scripts downloaded from the sites establish persistence through a file named wbdims.exe, likely hosted on GitHub, though it was unavailable at the time of analysis.

Further stages of the attack involve fetching additional scripts and payloads from the spoofed DocuSign domain, resulting in the download and execution of jp2launcher.exe, which deploys the NetSupport RAT.

While it’s unclear what threat actor is behind the campaign, researchers noted similarities in infrastructure and tactics with the SocGholish (FakeUpdates) malware campaign observed in late 2024. Furthermore, NetSupport Manager, though a legitimate remote administration tool, has frequently been co-opted by threat actors including FIN7, Scarlet Goldfinch, and Storm-0408 for malicious purposes.

Back to the list

Latest Posts

European Commission launches an alternative to popular DNS services

European Commission launches an alternative to popular DNS services

DNS4EU was created to offer a competitive alternative to widely used public DNS services like Google’s Public DNS and Cloudflare’s DNS.
9 June 2025
Scattered Spider cybercrime gang shifts from SIM-swapping to more advanced techniques

Scattered Spider cybercrime gang shifts from SIM-swapping to more advanced techniques

The group has evolved from a simple SIM-swapping operation into a “global threat” using sophisticated credential-harvesting campaigns.
9 June 2025
OpenAI bans accounts linked to Russian and Chinese threat actors exploiting ChatGPT for cyber ops

OpenAI bans accounts linked to Russian and Chinese threat actors exploiting ChatGPT for cyber ops

Russian threat actors exploited ChatGPT to develop Windows-based malware, set up command-and-control (C2) infrastructure, and debug multi-language code.
9 June 2025