<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ClickFix on</title><link>/tags/clickfix/</link><description>Recent content in ClickFix on</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 17 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="/tags/clickfix/index.xml" rel="self" type="application/rss+xml"/><item><title>NetSupport RAT via ClickFix</title><link>/posts/netsupportrat/</link><pubDate>Sun, 17 May 2026 00:00:00 +0000</pubDate><guid>/posts/netsupportrat/</guid><description>&lt;ul>
&lt;li>Reading time : &amp;ldquo;10 min&amp;rdquo;&lt;/li>
&lt;/ul>
&lt;h1 id="clickfix-phishing-campaign-delivering-netsupport-rat">ClickFix Phishing Campaign Delivering NetSupport RAT&lt;/h1>
&lt;p>A multi-stage attack chain leveraging fake property review portals, ClickFix social engineering, and a custom MSI dropper to establish persistent remote access via NetSupport Manager.&lt;/p>
&lt;h2 id="executive-summary">Executive Summary&lt;/h2>
&lt;p>A threat actor is operating a sophisticated phishing campaign impersonating Booking.com, directing victims to fraudulent property review portals. A ClickFix lure tricks users into executing a malicious msiexec command that downloads and installs a custom MSI dropper from attacker-controlled IP addresses. The dropper deploys a VBScript installer that extracts password-protected archives, establishes persistence via the Windows Startup folder, and launches a silently configured NetSupport Manager client, granting the attacker full remote access to compromised machines. All staging files are deleted upon completion to impede forensic investigation. Two C2 domains masquerade as CDN infrastructure to blend into normal network traffic.&lt;/p></description></item></channel></rss>