Technical Analysis & Remediation
Attack Vector & Infection Chain
The infection relies on "Pastejacking" (Clipboard Hijacking) rather than traditional exploit kits.
Injection
Compromised WordPress sites load a malicious script identified by the HTML ID ic-tracker-js.
Lure
A fake overlay mimics a browser check (Cloudflare Turnstile).
Execution
The user is instructed to click "I am not a robot," which copies a PowerShell payload to the clipboard. The user is then socially engineered to press Win+R (Run), Ctrl+V (Paste), and Enter.
Payload
The PowerShell script downloads and executes NetSupport RAT (often disguised as client32.exe), granting the attacker full remote control.
MITRE ATT&CK Mapping
T1204.001 (User Execution)
Malicious Link/Clipboard Paste.
T1059.001 (Command and Scripting Interpreter)
PowerShell execution via Run dialog.
T1566.002 (Phishing)
Spearphishing Link (via compromised legitimate sites).
T1219 (Remote Access Software)
NetSupport Manager usage.
Live Evidence & Indicators (IOCs)
Specific Marker
The presence of the script tag id="ic-tracker-js" in the page source.
C2/TDS Domains
ototaikfffkf[.]com (Active TDS domain).
185.196.8[.]0/24 (Network range often associated with ClickFix infrastructure).
Payload Artifacts
Files
client32.exe, client32.ini located in %APPDATA% or C:\ProgramData.
PowerShell Pattern
Base64 strings starting with SQB (often decodes to IEX).
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Hunt Query (SIEM/EDR)
Search for process creation events where explorer.exe spawns powershell.exe with arguments containing UseBypass or EncodedCommand immediately following a browser process focus.
Network Block
Blacklist ototaikfffkf[.]com and block traffic to known NetSupport RAT C2 IPs at the firewall level.
CMS Audit
Scan all managed WordPress instances for the ic-tracker-js string in theme headers (header.php) or plugin files.
Phase 2: Eradication
Process Termination
Kill active instances of client32.exe or suspicious mshta.exe processes.
File Removal
Delete the NetSupport installation directories (commonly hidden in C:\ProgramData\{Random_GUID}).
Persistence Removal
Audit Registry keys at HKCU\Software\Microsoft\Windows\CurrentVersion\Run for entries pointing to the RAT artifacts.
Phase 3: Recovery
Credential Reset
Force password resets for users who visited compromised sites, as NetSupport RAT likely harvested browser-stored credentials.
Re-imaging
For high-value targets, re-image the machine to ensure no secondary backdoors (e.g., CS beacons) remain.
Phase 4: Lessons Learned
Policy Update
Implement GPO to restrict the "Run" dialog (Win+R) or monitor clipboard usage for large scripts.
User Training
Conduct specific training on "Pastejacking"—users should never paste code into the Run dialog or Terminal.
Remediation - THE HOME USER TRACK
Priority 1: Safety & Disconnection
Disconnect
Immediately unplug your ethernet cable or disable Wi-Fi to sever the connection to the attacker.
Check Startup Items
Press Ctrl+Shift+Esc (Task Manager) -> Startup tab. Disable anything that looks like "NetSupport," "Client32," or random letters (e.g., xyqz.exe).
Priority 2: Scan & Clean
Run a Full Scan
Use Microsoft Defender or Malwarebytes to scan for "NetSupport RAT".
Manual Check
Open File Explorer, type %APPDATA% in the address bar, and look for suspicious folders created recently containing .exe files you don't recognize.
Priority 3: Identity Protection
Change Passwords
Once the PC is clean (or using a different, safe device), change passwords for your email, banking, and social media. The malware allows attackers to see your screen and steal saved passwords.
Hardening & References
Baseline (CIS/NIST)
CIS Benchmark 18.9.1: Ensure PowerShell Constrained Language Mode is enabled to limit the impact of malicious scripts.
NIST SP 800-83
Guide to Malware Incident Prevention and Handling (Focus on User Awareness).
Tactical Reference
Pattern Match: Look for id="ic-tracker-js" in website source code to confirm infection.
Traffic
Watch for HTTP POST requests to .php endpoints on uncommon ports (often used by NetSupport for C2).
Sources
Sekoia.io Blog