The infection chain begins when victims visit compromised websites that host an obfuscated JavaScript loader (phone.js) retrieved from attacker‑controlled domains such as boriver[.]com.
The loader runs only once per user session, using localStorage tracking to avoid multiple activations, an uncommon stealth feature for such scripts.
Heavily camouflaged with filler content and numeric index‑based decoding, the loader dynamically profiles the user’s device.
Mobile users receive a full-screen iframe redirect, while desktop users trigger a remote script injection that fetches the next stage from domains like stoneandjon[.]com.
De‑obfuscation with tools such as CyberChef revealed rotating string tables and nested IIFEs, concealing URLs, DOM actions, and encryption keys from static analysis.
Stage 2, a malicious HTML Application (HTA), runs through mshta.exe, a Microsoft‑signed binary frequently abused under the LOLBAS model.
The HTA silently executes in a hidden state, deploying a fileless PowerShell stager that decrypts its payload using AES‑256‑ECB, Base64, and GZIP routines.
The decrypted script is executed directly in memory with the ExecutionPolicy Bypass, avoiding disk artifacts and traditional antivirus scanning. The loader then deletes temporary files to erase forensic traces.
Stage 3 reveals the fully decrypted PowerShell payload that downloads and installs NetSupport RAT, a legitimate remote‑administration tool turned malware.
The script retrieves a ZIP archive (qazx.zip) from kindstki[.]com, extracts it into C:ProgramDataCommunicationLayer, and launches the client executable (client32.exe) via wscript.exe using a concealed JScript launcher (run.js).
Persistence is achieved by creating a disguised shortcut named WindowsUpdate.lnk, ensuring the RAT runs automatically on reboot.
Once active, NetSupport RAT grants attackers complete remote control, including desktop manipulation, file transfer, command execution, and proxying.
Its behavior matches known RAT deployments used by financially motivated threat actors and access‑broker groups.
Researchers traced the infrastructure to multiple domains, including border [.]com, stoneandjon[.]com, kindstki[.]com, and others linked to IP addresses in Europe and the United States.
Associated file hashes and PowerShell traces confirm a JS#SMUGGLER‑style modular framework engineered for persistence, stealth, and multi‑device targeting.
Defenders are urged to block mshta.exe misuse, enforce strict script‑execution policies, enable PowerShell logging, and monitor Startup folder changes, given the campaign’s heavy reliance on fileless PowerShell execution and staged loaders.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Sophisticated Multi-Stage JS#SMUGGLER Attack Installs ‘NetSupport RAT’ to Seize Complete System Control appeared first on Cyber Security News.
The first full trailer for Spider-Man: Brand New Day will be released tomorrow — but…
Sarah Michelle Gellar has discussed the shock cancellation of her Buffy the Vampire Slayer reboot…
Saudi Arabia now owns 10% of Capcom, after Saudi Crown Prince Mohammed Bin Salman's Electronic…
The post Wired’s New Editor Doesn’t Care If The Tech Bros Are Mad appeared first…
The post 2026 NAB Show Offering Free Show Floor Passes To Creators appeared first on…
Today, Spectrum launched its new Multiview feature in the Spectrum TV App, giving customers the ability to…
This website uses cookies.