EVALUSION攻击活动揭秘:新型ClickFix手法传播Amatera窃密木马与NetSupport远控

网络安全研究人员发现了一场名为EVALUSION的新型ClickFix攻击活动,该活动利用社交工程诱骗用户执行恶意命令,进而部署Amatera窃密木马与NetSupport远程访问木马。文章详细剖析了攻击链、恶意软件功能及相关的过滤与规避技术。

New ClickFix Campaign “EVALUSION” Deploys Amatera Stealer and NetSupport RAT

Post Views: 32

Cybersecurity researchers have uncovered a new wave of ClickFix-style malware attacks delivering both Amatera Stealer and NetSupport RAT, tracked by eSentire as EVALUSION.

ClickFix, a fast-growing social engineering tactic, lures victims into manually running malicious commands through the Windows Run dialog under the guise of bypassing a “reCAPTCHA verification.” This approach bypasses many automated security safeguards and has become a preferred tactic for numerous malware operators.

The latest activity has been observed throughout October 2025, marking a significant expansion in the distribution of Amatera Stealer — a successor to AcridRain (ACR) Stealer — and accompanying remote access tools.

Amatera Stealer: An Evolved MaaS Platform

First discovered in June 2025, Amatera Stealer is marketed via subscription plans ranging from $199/month up to $1,499/year, aligning with the rise of malware-as-a-service offerings.

Key features include:

  • Extensive data theft capabilities targeting
    • Crypto wallets
    • Web browsers
    • Messaging apps
    • Email clients
    • FTP clients
  • Advanced evasion methods such as
    • WoW64 SysCalls to bypass user-mode hooks used by AV, EDR, and sandboxes
    • DLL payloads packed with PureCrypter, a crypter/loader also sold as a MaaS product

Targeting Logic: Only High-Value Victims Get NetSupport RAT

eSentire’s analysis highlights a clever filtering mechanism:

If the infected endpoint is not domain-joined and does not contain files of financial or operational value, Amatera does not download NetSupport RAT.

This avoids wasting resources and reduces noise that could alert defenders, focusing efforts on victims most likely to yield profit.

How the ClickFix Attack Works

The attack chain mirrors other ClickFix-driven campaigns:

  1. User is shown a fake CAPTCHA or Cloudflare Turnstile-style page.
  2. The page instructs them to open the Windows Run dialog and paste a command.
  3. Executing the command triggers mshta.exe, which runs a PowerShell loader.
  4. The loader fetches a .NET payload (typically from MediaFire).
  5. Amatera Stealer is installed, followed by NetSupport RAT (if the system is valuable).

This multi-stage flow allows EDR evasion while leveraging trusted Windows binaries (“living-off-the-land”).

eSentire and other vendors report a surge in ClickFix-enabled campaigns dropping a variety of malware:

  1. XWorm via VBS Invoice Lures
    • Malicious VBS attachments disguise themselves as invoices.
    • A batch file invokes PowerShell to fetch and run XWorm.
  2. SmartApeSG / HANEYMANEY / ZPHP
    • Compromised websites inject malicious JavaScript.
    • Victims are redirected to fake Cloudflare Turnstile checks that deliver NetSupport RAT.
  3. Fake Booking.com CAPTCHA
    • Hospitality sector targeted.
    • Fake CAPTCHA pages instruct users to run PowerShell commands dropping credential stealers.
  4. Email Delivery Notification Spoofs
    • Fraudulent “blocked messages” prompts.
    • Leads victims to credential-harvesting sites designed to siphon corporate logins.

Cephas & Tycoon 2FA: Evolving Credential Phishing Kits

A growing number of phishing kits also support ClickFix-style flows, including:

  • Cephas
    • Emerged in August 2024
    • Uses an unusual obfuscation technique that inserts random invisible Unicode characters
    • Helps evade anti-phishing scanners and disrupts YARA detection
  • Tycoon 2FA
    • Intercepts authentication flows to steal credentials and 2FA tokens
    • Used in attacks against cloud services and corporate email accounts

Barracuda reports these kits are becoming increasingly stealthy and professionalized, lowering barriers for inexperienced attackers.

Source: thehackernews.com, esentire.com/blog

comments powered by Disqus
使用 Hugo 构建
主题 StackJimmy 设计