{"id":12085,"date":"2026-02-23T14:02:32","date_gmt":"2026-02-23T14:02:32","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12085"},"modified":"2026-02-23T14:02:32","modified_gmt":"2026-02-23T14:02:32","slug":"graycharlie-hacks-wordpress-websites-spreads-netsupport-rat-and-stealc-malware","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12085","title":{"rendered":"GrayCharlie Hacks WordPress Websites, Spreads NetSupport RAT and Stealc Malware"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>GrayCharlie is abusing compromised WordPress websites to silently load malicious JavaScript that pushes NetSupport RAT, typically adopted by Stealc and SectopRAT, through pretend browser updates and ClickFix lures.<\/p>\n<p>Insikt Group tracks GrayCharlie as a financially motivated menace actor overlapping with SmartApeSG, lively since mid\u20112023, and specializing in turning authentic WordPress websites into malware-delivery factors. <\/p>\n<p>The actor injects hyperlinks to externally hosted JavaScript into compromised pages, which then redirect guests to pretend browser-update pages or <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/clickfix-social-engineering-tactics-to-deploy-malware\/\" type=\"post\" id=\"99227\" target=\"_blank\" rel=\"noreferrer noopener\">ClickFix-style social engineering <\/a>flows that in the end ship the NetSupport RAT. <\/p>\n<p>As soon as NetSupport is put in and linked to attacker\u2011managed C2 servers, GrayCharlie operators achieve distant entry for surveillance, file operations, and observe\u2011on payload supply, together with infostealer Stealc and distant entry malware SectopRAT.<\/p>\n<p>Insikt Group <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.recordedfuture.com\/research\/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">studies that GrayCharlie<\/a> operates a large, layered infrastructure footprint, closely targeting suppliers MivoCloud and HZ Internet hosting Ltd. <\/p>\n<p>This consists of devoted NetSupport RAT C2 servers, staging servers internet hosting the malicious JavaScript templates, and better\u2011tier programs used to manage campaigns, typically accessed by way of proxy companies.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.recordedfuture.com\/research\/media_14fd6cf6079b29690c9ef99e5ec9308e54ce5364d.png?width=2000&amp;format=webply&amp;optimize=medium\" alt=\"Overview of GrayCharlie clusters observed in 2025 (Source : Insikt Group).\"\/><figcaption class=\"wp-element-caption\"><em>Overview of GrayCharlie clusters noticed in 2025<\/em> (Supply : Insikt Group).<\/figcaption><\/figure>\n<\/div>\n<p>The group\u2019s exercise stays constant throughout campaigns, with recurring use of the identical an infection chains, license keys, and TLS certificates patterns on its C2 infrastructure.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-fake-updates-clickfix-and-law-firm\"><strong>Faux Updates, ClickFix, and Regulation Agency <\/strong><\/h2>\n<p>Initially, GrayCharlie relied totally on pretend browser replace overlays, which seem tailor-made to Chrome, Edge, or Firefox and immediate customers to obtain a supposed replace package deal that&#8217;s truly a JavaScript <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/netsupport-0-day\/\" type=\"post\" id=\"176092\" target=\"_blank\" rel=\"noreferrer noopener\">pushed NetSupport installer<\/a>. <\/p>\n<p>The IP addresses related to the staging infrastructure are linked to web sites impersonating \u201cWiser College\u201d a fictional entity used to exhibit Wiser, a free Bootstrap HTML5 training.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.recordedfuture.com\/research\/media_1500e0d2021b91244c59d04e70097054a1c748693.png?width=2000&amp;format=webply&amp;optimize=medium\" alt=\"Website impersonating \u201cWiser University\u201d (Source : Insikt Group). \"\/><figcaption class=\"wp-element-caption\"><em>Web site impersonating \u201cWiser College\u201d<\/em> (Supply : Insikt Group). <\/figcaption><\/figure>\n<\/div>\n<p>The loader script launches through WScript, levels PowerShell, downloads and extracts the NetSupport shopper into places reminiscent of %AppData%, provides Registry Run keys for persistence, after which beaconing to GrayCharlie\u2011managed C2 servers. <\/p>\n<p>In 2025, the actor expanded to a ClickFix stream, the place <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/5-best-security-measures-for-wordpress-security\/\" type=\"post\" id=\"50214\">compromised WordPress pages<\/a> show a pretend CAPTCHA that copies a PowerShell\u2011based mostly command to the clipboard and instructs customers to execute it utilizing the Home windows Run dialog, once more leading to NetSupport RAT set up and persistence.<\/p>\n<p>Most sufferer websites seem opportunistically compromised throughout many sectors, however Insikt Group additionally highlights a notable cluster of US legislation agency WordPress websites that started loading malicious JavaScript from GrayCharlie\u2011managed infrastructure round November 2025. <\/p>\n<p>Proof suggests these legislation agency websites might have been compromised through a provide\u2011chain vector involving a shared IT or advertising and marketing supplier, with SMB Crew cited as a probable avenue as a result of its branding and shared credentials surfacing across the time the malicious infrastructure grew to become lively. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.recordedfuture.com\/research\/media_18fd20865333f5d84a84b457d80ddd430d382877b.png?width=2000&amp;format=webply&amp;optimize=medium\" alt=\"&#10;Website of Gerling Law Injury Attorneys (top) and SMBTeam logo (bottom) (Source : Insikt Group). \"\/><figcaption class=\"wp-element-caption\"><em>Web site of Gerling Regulation Harm Attorneys (high) and SMBTeam emblem (backside)<\/em> (Supply : Insikt Group). <\/figcaption><\/figure>\n<\/div>\n<p>Whereas GrayCharlie\u2019s final goals stay unclear, present telemetry factors to information theft, monetary achieve, and doubtlessly promoting or sharing entry with different menace actors, underlining the chance to authorized and different excessive\u2011worth targets.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-mitigations\"><strong>Mitigations<\/strong><\/h2>\n<p>Insikt Group advises defenders to aggressively block IP addresses and domains tied to NetSupport RAT, Stealc, SectopRAT, and different instruments utilized in GrayCharlie operations, and to deal with visitors to recognized\u2011compromised WordPress websites as excessive\u2011threat till remediated. <\/p>\n<p>The web page presents a pretend CAPTCHA that quietly copies a malicious command to the person\u2019s clipboard and instructs them to stick it into the Home windows Run dialog (Win+R).<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.recordedfuture.com\/research\/media_1f878a544b5193108d0dd7bc5d1359a3487d5a705.png?width=2000&amp;format=webply&amp;optimize=medium\" alt=\"Fake Captcha (Source : Insikt Group). \"\/><figcaption class=\"wp-element-caption\"><em>Faux Captcha<\/em> (Supply : Insikt Group). <\/figcaption><\/figure>\n<\/div>\n<p>Safety groups ought to<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/165-yara-rules-to-detect-cobalt-strike\/\" type=\"post\" id=\"60206\" target=\"_blank\" rel=\"noreferrer noopener\"> deploy up to date YARA<\/a>, Snort, and Sigma guidelines to detect NetSupport parts, ClickFix\u2011model instructions, and GrayCharlie\u2019s JavaScript and PowerShell loader patterns, together with in historic logs. <\/p>\n<p>Further beneficial controls embody tightening e-mail and net filtering, monitoring for suspicious information exfiltration to recognized malicious infrastructure, and constantly ingesting new GrayCharlie menace intelligence sources to maintain detection and blocking insurance policies present.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instantaneous Updates and Set GBH as a Most well-liked Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>.<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>GrayCharlie is abusing compromised WordPress websites to silently load malicious JavaScript that pushes NetSupport RAT, typically adopted by Stealc and SectopRAT, through pretend browser updates and ClickFix lures. Insikt Group tracks GrayCharlie as a financially motivated menace actor overlapping with SmartApeSG, lively since mid\u20112023, and specializing in turning authentic WordPress websites into malware-delivery factors. The [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[7957,1497,216,6092,1538,1900,7958,7959,3852],"class_list":["post-12085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-graycharlie","tag-hacks","tag-malware","tag-netsupport","tag-rat","tag-sites","tag-spreads","tag-stealc","tag-wordpress"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12085"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12085\/revisions"}],"predecessor-version":[{"id":12086,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12085\/revisions\/12086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12087"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-13 10:41:16 UTC -->