How Threat Actors Exploit Human Trust: A Breakdown of the 'Prove You Are Human' Malware Scheme
A malicious campaign exploits user trust through deceptive websites, including spoofed Gitcodes and fake Docusign verification pages. Victims are tricked into running malicious PowerShell scripts on their Windows machines, leading to the installation of NetSupport RAT. The multi-stage attack uses clipboard poisoning and fake CAPTCHAs to deliver the malware. The campaign involves multiple domains, uses ROT13 encoding, and creates persistent infections. Similar techniques were observed in other spoofed content, including Okta and popular media apps. The attack capitalizes on user familiarity with common online interactions, emphasizing the need for vigilance and skepticism in online activities.
Pulse ID: 684209ff0c889eabbed70e8b
Pulse Link: https://otx.alienvault.com/pulse/684209ff0c889eabbed70e8b
Pulse Author: AlienVault
Created: 2025-06-05 21:19:59
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CAPTCHA #Clipboard #CyberSecurity #InfoSec #Mac #Malware #NetSupport #NetSupportRAT #OTX #OpenThreatExchange #PowerShell #RAT #Rust #Windows #bot #AlienVault