• Reading time : “10 min”

ClickFix Phishing Campaign Delivering NetSupport RAT

A multi-stage attack chain leveraging fake property review portals, ClickFix social engineering, and a custom MSI dropper to establish persistent remote access via NetSupport Manager.

Executive Summary

A threat actor is operating a sophisticated phishing campaign impersonating Booking.com, directing victims to fraudulent property review portals. A ClickFix lure tricks users into executing a malicious msiexec command that downloads and installs a custom MSI dropper from attacker-controlled IP addresses. The dropper deploys a VBScript installer that extracts password-protected archives, establishes persistence via the Windows Startup folder, and launches a silently configured NetSupport Manager client, granting the attacker full remote access to compromised machines. All staging files are deleted upon completion to impede forensic investigation. Two C2 domains masquerade as CDN infrastructure to blend into normal network traffic.

  • Reading time : “6 min”

Executive Summary

  1. Scope. A company web server was compromised via the hosted site. The team captured a forensic disk image and a live memory dump in time for offline analysis. Artifacts for this walkthrough: archive.org: dfir-case1.

  2. Web layer. Apache access and error logs show repeated OWASP-style abuse: SQL injection (including attempted INTO OUTFILE / upload-style payloads), reflected XSS, local file inclusion / path traversal, and an IDS log-clear request consistent with covering tracks on the app.

Macro on Phishing Email

- 9 mins read

Series: DFIR

  • Reading time : “16 min”

The phishing email

After receiving this phishing email with this information, the link on the download leads to downloading a suspicious XLSX file.

alt text

Key Observations:

  • The email uses social engineering tactics to create urgency
  • The download link points to an external hosting service
  • No legitimate business would request action through such generic messaging

The Malicious XLSX File

By gathering its SHA256 and verifying on VirusTotal, we can tell that it is a malicious file.

Incident Response

- 20 mins read

Series: Hunting the hunter

  • Reading time : “16 min”

GETI City Cyber Crisis

Episode 01: The Breach


In the heart of Golang Country stands GETI City - a metropolis where technology and ambition touch the sky…


Scene 1: The City

The winter wind howls through GETI City’s glass-and-steel canyons, carrying whispers of digital secrets between towering skyscrapers. Neon signs pierce the darkness, their glow reflecting off the frost-covered windows of Brukley Company’s cybersecurity headquarters.

Reverse Eng

- 5 mins read

Series: Assembly

  • Reading time : “8 min”

The Digital Storm Chronicles

Episode 1: The Binary Tempest

A storm rages outside as two security experts face their first challenge

Scene 1: The Two Old Cracker Friends

Thunder crashes outside a dimly lit apartment in C City

Monaquimbamba: “Hey, how are you?”

Howard: “Thanks for coming! I’m having trouble with this binary that a winter phenomenon sent to my bitcoin wallet.”

./bitcoinnewallet
arm-binfmt-P: Could not open '/lib/ld-linux.so.3': No such file or directory

Howard: “Shit, let me check the processor architecture…”