September 26, 2025
By esentry Team

SmartApeSG Deploys Advanced ClickFix Social Engineering Campaign

The SmartApeSG threat actor is conducting an active campaign leveraging compromised websites to deploy sophisticated "ClickFix" social engineering attacks. This operation bypasses traditional security controls by weaponizing user trust and manual execution, resulting in NetSupportRAT and StealC v2 infections across multiple sectors.


Primary Vectors: Compromised websites, clipboard manipulation
Target Sectors: Multi-sector campaign affecting various industries
Payloads: NetSupport RAT, StealC v2 information stealer

ATTACK METHODOLOGY

Initial Compromise

SmartApeSG compromises legitimate websites and injects malicious JavaScript to create convincing fake CAPTCHA overlays that mimic genuine verification systems.

User Manipulation

Victims encounter what appears to be a standard "I'm not a robot" verification prompt. However, the fake CAPTCHA instructs users to:

  • Press Win + R to "verify" their identity
  • Paste clipboard contents into the Windows Run dialog
  • Execute the command by pressing Enter

Clipboard Weaponization

When users click the fake CAPTCHA button, malicious PowerShell commands are silently copied to their clipboard through a technique known as "paste jacking." Users unknowingly paste and execute these commands, believing they're completing a legitimate verification.

Payload Deployment

The executed PowerShell script initiates a download chain that delivers:

  • NetSupport RAT: Provides persistent remote access and command execution
  • StealC v2: Harvests credentials, browser data, and sensitive information

TECHNICAL INDICATORS

Attack Characteristics:

  • Exploitation of user trust rather than technical vulnerabilities
  • Manual execution bypasses automated security controls
  • Uses legitimate system tools (PowerShell, Run dialog) for malicious purposes
  • Multi-stage payload delivery obscures initial detection

Related Techniques:

  • File Fix Variant: Similar campaign using file upload manipulation and steganographic image concealment .
  • Both variants represent evolution of command-injection social engineering.

ATTRIBUTION

While SmartApeSG's ultimate objectives remain under investigation, the dual-payload approach (remote access + data theft) suggests either:

  • Initial access broker operations for ransomware affiliates.
  • Direct financial motivation through credential monetization.
  • Espionage activities targeting specific sectors.

DEFENSIVE RECOMMENDATIONS

  • Hunt for IOCs: Search for NetSupport RAT and StealC v2 signatures in your environment.
  • Review PowerShell logs: Analyze command-line activity for suspicious execution patterns.
  • User notification: Alert staff about fake CAPTCHA campaigns via security awareness channels.
  • EDR tuning: Configure endpoint  detection rules for anomalous PowerShell execution and clipboard manipulation.
  • Network monitoring: Implement blocking for known C2 infrastructure associated with NetSupport RAT.
  • Group Policy restrictions: Consider  disabling Windows Run dialog (Win + R) for non-administrative users.
  • Application allow listing: Deploy comprehensive whitelisting to prevent unauthorized executable launches.
  • User training enhancement: Integrate ClickFix/FileFix scenarios into security awareness programs.
  • Web filtering: Strengthen URL reputation services and content inspection capabilities.