• CONTACT
  • MARKETCAP
  • BLOG
Coin Mela Coin Mela
  • Home
  • News
    • All News
    • Bitcoin
    • Ethereum
    • XRP
    • Altcoins
    • NFT
    • Blockchain
    • Web3
    • DeFi
    • Finance
    • Stocks
    • Company
  • Learn
  • Market
  • Advertise
Reading: Cybersecurity Researchers Uncover JS#SMUGGLER Campaign Distributing NetSupport RAT via Compromised Websites
Share
  • bitcoinBitcoin(BTC)$75,209.00
  • ethereumEthereum(ETH)$2,201.26
  • tetherTether(USDT)$1.00
  • binancecoinBNB(BNB)$740.30
  • rippleXRP(XRP)$1.56
  • usd-coinUSDC(USDC)$1.00
  • solanaSolana(SOL)$94.16
  • tronTRON(TRX)$0.284310
  • staked-etherLido Staked Ether(STETH)$2,260.93
  • dogecoinDogecoin(DOGE)$0.105675
CoinMelaCoinMela
Font ResizerAa
  • Home
  • News
  • Learn
  • Market
  • Advertise
Search
  • Home
  • News
    • All News
    • Bitcoin
    • Ethereum
    • XRP
    • Altcoins
    • NFT
    • Blockchain
    • Web3
    • DeFi
    • Finance
    • Stocks
    • Company
  • Learn
  • Market
  • Advertise
Have an existing account? Sign In
Follow US
© Coin Mela Network. All Rights Reserved.
News

Cybersecurity Researchers Uncover JS#SMUGGLER Campaign Distributing NetSupport RAT via Compromised Websites

News Desk
Last updated: December 9, 2025 8:05 am
News Desk
Published: December 9, 2025
Share
Cybersecurity Researchers Uncover JS#SMUGGLER Campaign Distributing NetSupport RAT via Compromised Websites

Cybersecurity researchers have recently highlighted a concerning new campaign called JS#SMUGGLER, which is utilizing compromised websites to distribute a remote access trojan known as NetSupport RAT. An analysis conducted by Securonix reveals a sophisticated attack chain that involves three primary components: an obfuscated JavaScript loader embedded within a compromised website, an HTML Application (HTA) that executes encrypted PowerShell stagers using “mshta.exe,” and a PowerShell payload designed to download and run the main malware.

According to researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee, NetSupport RAT provides attackers with comprehensive control over victim hosts. This includes remote desktop access, file operations, command execution capabilities, data theft, and proxy functions. At this point in time, there is minimal evidence linking this campaign to any specific threat group or nation, but the activity predominantly targets enterprise users via compromised websites, suggesting an extensive operational effort.

The researchers describe the operation as a multi-stage, web-based malware deployment that employs hidden iframes, obfuscated loaders, and layered script execution techniques to facilitate malware installation and remote control. The initial phase of the attack features silent redirects embedded in infected websites, allowing the retrieval of a heavily scrambled JavaScript loader, referred to as “phone.js,” from an external domain. This loader assesses the device it is executed on, determining whether to display a full-screen iframe for mobile users or to load an additional remote script for desktop users.

The invisible iframe is designed to redirect users to a malicious URL, and the JavaScript loader employs a tracking mechanism to ensure that its malicious activities are triggered only once during the victim’s first visit, thereby minimizing the likelihood of detection. This adaptive mechanism allows attackers to tailor their infection process, concealing malicious actions in specific environments and enhancing their success rate by delivering payloads suited to the particular platform.

In subsequent stages of the attack, the remote script initialized in the first phase constructs a URL from which an HTA payload is downloaded and executed using “mshta.exe.” This HTA payload acts as a secondary loader for a temporary PowerShell stager, which is decrypted and executed in memory to evade detection. Additionally, the HTA file is designed to run covertly, disabling visible window elements and minimizing at startup. Upon execution, the decrypted payload also removes the PowerShell stager from disk and terminates itself to leave a minimal forensic footprint.

The primary objective of the PowerShell payload is to retrieve and deploy NetSupport RAT, thereby granting attackers complete control over the compromised system. Securonix noted the sophistication of the operation and the layered evasion techniques employed, suggesting a professionally maintained malware framework. To effectively combat such attacks, they recommend implementing strong Content Security Policy (CSP) enforcement, script monitoring, PowerShell logging, mshta.exe restrictions, and behavioral analytics.

The announcement of the JS#SMUGGLER campaign follows closely on the heels of another multi-stage malspam operation, CHAMELEON#NET, recently analyzed by the same cybersecurity firm. This earlier campaign was designed to deliver Formbook, a keylogger and information-stealing malware, using phishing emails to target individuals in the National Social Security Sector. These emails trick victims into downloading a seemingly harmless archive, which then initiates a complex infection chain.

The initial phase of the CHAMELEON#NET campaign starts with a phishing email that prompts users to download a .BZ2 archive. The payload—an obfuscated JavaScript file—serves as a dropper, leading to the execution of a sophisticated VB.NET loader. This loader employs advanced reflection and a customized conditional XOR cipher for decryption.

The JavaScript dropper also creates two additional JavaScript files in the %TEMP% directory. The first, svchost.js, drops a .NET loader executable named DarkTortilla (“QNaZg.exe”), a crypter frequently used for distributing subsequent payloads. The second file, adobe.js, releases an MSI installer package titled “PHat.jar,” which behaves similarly to svchost.js.

Ultimately, the loader is configured to decrypt and run an embedded DLL containing the Formbook malware, ensuring persistence by adding itself to the Windows startup folder or managing persistence via the Windows Registry. The researchers emphasize that the threat actors effectively combine social engineering tactics, heavy script obfuscation, and advanced .NET evasion methods to compromise their targets successfully. The custom decryption routines, followed by reflective loading, allow the final payload to execute in a fileless manner, complicating detection and forensic analysis significantly.

Emerging Cup-and-Handle Pattern Signals Potential $3 Trillion Altcoin Rally
Fed Rate Cut Fuels Crypto Market Rally, DeepSnitch AI Leads Presales
Figure Technology Raises $787.5 Million in IPO as Crypto Market Matures
Bitcoin Fear & Greed Index Plummets to Lowest Level in Six Months Amid Market Crash
SWIFT vs Ripple: Competing Visions for the Future of Cross-Border Settlement
Share This Article
Facebook Whatsapp Whatsapp
ByNews Desk
Follow:
CoinMela News Desk brings you the latest updates, insights, and in-depth coverage from the world of cryptocurrencies, blockchain, and digital finance.
Previous Article Julia Fox Debuts New Cropped Hairdo in NYC Julia Fox Debuts New Cropped Hairdo in NYC
Next Article Bitcoin decrypt style 07 gID 7 Bitcoin Approaches Key Support Level as ETF Flows Turn Negative
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News
1767101674 ce6e5878a3bba05bcb92f58c5d32dad187180ea3 1920x1080
Citi Warns Crypto Markets At Critical Juncture Amid Continued Declines and Regulatory Concerns
cd606e60 014b 11f1 9b7d cf7fc07d3a05
AI Stock Rout Deepens as Software Companies Face Disruption Fears
69827923a645d1188188a04b
Bitcoin Faces Significant Sell-Off Amid Hawkish Federal Reserve Nominations and Regulatory Delays
- Advertisement -
Ad image

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
Coin Mela Coin Mela
CoinMela is your one-stop destination for everything Crypto, Web3, and DeFi news.
  • About Us
  • Contact Us
  • Corrections
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Advertise with Us
  • Quick Links
  • Finance
  • News
  • Company
  • Stocks
  • Bitcoin
  • XRP
  • Ethereum
  • Altcoins
  • Blockchain
  • DeFi
© Coin Mela Network. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?