By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
Computing

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

News Room
Last updated: 2025/11/17 at 12:31 PM
News Room Published 17 November 2025
Share
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
SHARE

Nov 17, 2025Ravie Lakshmanan

Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT.

The activity, observed this month, is being tracked by eSentire under the moniker EVALUSION.

First spotted in June 2025, Amatera is assessed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available under the malware-as-a-service (MaaS) model until sales of the malware were suspended in mid-July 2024. Amatera is available for purchase via subscription plans that go from $199 per month to $1,499 for a year.

“Amatera provides threat actors with extensive data exfiltration capabilities targeting crypto-wallets, browsers, messaging applications, FTP clients, and email services,” the Canadian cybersecurity vendor said. “Notably, Amatera employs advanced evasion techniques such as WoW64 SysCalls to circumvent user-mode hooking mechanisms commonly used by sandboxes, Anti-Virus solutions, and EDR products.”

DFIR Retainer Services

As is typically the case with ClickFix attacks, users are tricked into executing malicious commands using the Windows Run dialog in order to complete a reCAPTCHA verification check on bogus phishing pages. The command initiates a multi-step process that involves using the “mshta.exe” binary to launch a PowerShell script that’s responsible for downloading a .NET downloaded from MediaFire, a file hosting service.

The payload is the Amatera Stealer DLL packed using PureCrypter, a C#-based multi-functional crypter and loader that’s also advertised as a MaaS offering by a threat actor named PureCoder. The DLL is injected into the “MSBuild.exe” process, following which the stealer harvests sensitive data and contacts an external server to execute a PowerShell command to fetch and run NetSupport RAT.

“What is particularly noteworthy in the PowerShell invoked by Amatera is a check to determine if the victim machine is part of a domain or has files of potential value, e.g., crypto wallets,” eSentire said. “If neither is found, NetSupport is not downloaded.”

The development dovetails with the discovery of several phishing campaigns propagating a wide range of malware families –

  • Emails containing Visual Basic Script attachments that masqueraded as invoices to deliver XWorm by means of a batch script that invokes a PowerShell loader
  • Compromised websites injected with malicious JavaScript that redirects site visitors to bogus ClickFix pages mimicking Cloudflare Turnstile checks to deliver NetSupport RAT as part of an ongoing campaign codenamed SmartApeSG (aka HANEYMANEY and ZPHP)
  • Using fake Booking.com sites to display fake CAPTCHA checks that employ ClickFix lures to run a malicious PowerShell command that drops a credential stealer when executed via the Windows Run dialog
  • Emails spoofing internal “email delivery” notifications that falsely claim to have blocked important messages related to outstanding invoices, package deliveries, and Request for Quotations (RFQs) in order to trick recipients into clicking on a link that siphons login credentials under the pretext of moving the messages to the inbox
  • Attacks using phishing kits named Cephas (which first emerged in August 2024) and Tycoon 2FA to lead users to malicious login pages for credential theft

“What makes Cephas noteworthy is that it implements a distinctive and uncommon obfuscation technique,” Barracuda said in an analysis published last week. “The kit obscures its code by creating random invisible characters within the source code that help it evade anti-phishing scanners and obstruct signature-based YARA rules from matching the exact phishing methods.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Longevity Startup Funding Sees Fewer Moonshots, But Plenty Of Buzzy Investments Longevity Startup Funding Sees Fewer Moonshots, But Plenty Of Buzzy Investments
Next Article The Government allocates 233 million to the deployment of AI in Health The Government allocates 233 million to the deployment of AI in Health
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Game emulators on Android are super hot right now, and here’s the proof
Game emulators on Android are super hot right now, and here’s the proof
News
Alli AI Unveils An Innovative System For Creating And Editing 8K Video Up To 60 Seconds Long | HackerNoon
Alli AI Unveils An Innovative System For Creating And Editing 8K Video Up To 60 Seconds Long | HackerNoon
Computing
The ’12 Scams of Christmas’ that will nick £1,000s from your bank in seconds
The ’12 Scams of Christmas’ that will nick £1,000s from your bank in seconds
News
The sold-out Nex Playground made my kids laugh and cry
The sold-out Nex Playground made my kids laugh and cry
News

You Might also Like

Alli AI Unveils An Innovative System For Creating And Editing 8K Video Up To 60 Seconds Long | HackerNoon
Computing

Alli AI Unveils An Innovative System For Creating And Editing 8K Video Up To 60 Seconds Long | HackerNoon

6 Min Read
DragonFlyBSD’s VirtIO Block Driver Lands Multi-Queue Support
Computing

DragonFlyBSD’s VirtIO Block Driver Lands Multi-Queue Support

1 Min Read
The TechBeat: Best AI Automation Platforms for Building Smarter Workflows in 2026 (12/20/2025) | HackerNoon
Computing

The TechBeat: Best AI Automation Platforms for Building Smarter Workflows in 2026 (12/20/2025) | HackerNoon

7 Min Read
Mesa 26.0 NVK Driver Lands Improvement For NVIDIA GeForce RTX 20 "Turing" GPUs
Computing

Mesa 26.0 NVK Driver Lands Improvement For NVIDIA GeForce RTX 20 "Turing" GPUs

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?