Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
NetSupport Strikes Again: How Attackers Are Reusing Remote Support Tools for Malicious Campaigns
Attackers are getting creative by using malicious MSIX packages to drop a preconfigured NetSupport client. This sneaky method allows them to communicate with compromised computers without building their own C2 infrastructure. Forget AnyDesk or TeamViewer; NetSupport is the silent underdog in the remote support tools…

Hot Take:
Who needs to be a cyber genius when you can just borrow from the best? Attackers are like the MacGyvers of the digital world, mixing and matching old tricks to create new mischief. NetSupport Manager? More like NetSupport Sneak Attack!
Key Points:
- Attackers are using malicious MSIX packages to deploy preconfigured NetSupport clients.
- These clients phone home to an attacker-controlled manager, providing remote communication.
- NetSupport is a favored tool because it avoids the need to create custom command and control (C2) infrastructure.
- These packages can remain under the radar due to low detection scores on platforms like VirusTotal.
- NetSupport offers a 30-day free trial, which is more than enough time for attackers to launch their campaigns.