A new NetSupport RAT malware campaign has been uncovered, targeting Windows users worldwide through fake browser updates and drive-by downloads. The attackers weaponize compromised websites and malicious ads to deliver NetSupport Manager Remote Access Trojan (RAT), which allows full remote control of infected systems. This campaign represents a growing cybersecurity threat in 2025, as it blends social engineering, phishing, and malware delivery tactics to bypass traditional defenses .
Victims are lured into downloading browser updates for Chrome, Edge, and Firefox from compromised websites. Once users click the fake update, malicious JavaScript code executes, initiating the download of NetSupport RAT payloads. These drive-by infections require minimal user interaction, making them highly effective in spreading malware .
The attackers use SEO poisoning techniques, ranking malicious pages high in search results. Redirect chains take users from legitimate sites to attacker-controlled domains, where the fake update prompt is displayed. This ensures large-scale exposure and mass infection rates .
Once installed, the NetSupport RAT gives attackers the ability to remotely access infected machines, execute arbitrary commands, steal sensitive data, manipulate files, and monitor user activity. It transforms compromised endpoints into backdoors for cybercriminal operations .
The malware establishes persistence via registry modifications and leverages legitimate-looking processes to avoid detection. By masquerading as a genuine NetSupport Manager tool, it evades endpoint defenses and blends into enterprise environments .
The campaign is linked to multiple malicious domains and IPs hosting the NetSupport RAT payload. Security researchers also identified specific SHA256 hashes of infected executables, which serve as critical IOCs for detection and response .
The tactics align with MITRE ATT&CK techniques, including:
TA0001 Initial Access: Drive-by Compromise (T1189), User Execution via Malicious File (T1204)
TA0002 Execution: Command and Scripting Interpreter (T1059)
TA0003 Persistence: Registry Run Keys (T1547.001)
TA0005 Defense Evasion: Masquerading (T1036)
TA0007 Discovery: System Information Discovery (T1082)
TA0011 Command & Control: Application Layer Protocol (T1071)
This mapping confirms the sophistication of the NetSupport RAT threat campaign .
Educate users to avoid clicking on fake browser update prompts.
Block malicious domains and monitor for suspicious redirect chains.
Leverage endpoint detection and response (EDR) tools to identify persistence mechanisms.
Update browsers and software only via official vendor sites.
Track IOCs (domains, hashes, IPs) linked to this campaign to contain infections .
The NetSupport RAT malware campaign highlights the increasing use of fake browser updates as a vehicle for Remote Access Trojans in 2025. By combining SEO poisoning, malicious redirects, and drive-by downloads, cybercriminals can compromise endpoints at scale. Organizations must adopt proactive cybersecurity measures, including patch management, EDR solutions, and user awareness training, to reduce exposure to NetSupport RAT and similar malware threats .
Get through updates and upcoming events, and more directly in your inbox