NetSupport Strikes Again: How Attackers Are Reusing Remote Support Tools for Malicious Campaigns

Attackers are getting creative by using malicious MSIX packages to drop a preconfigured NetSupport client. This sneaky method allows them to communicate with compromised computers without building their own C2 infrastructure. Forget AnyDesk or TeamViewer; NetSupport is the silent underdog in the remote support tools…

Hot Take:

Who needs to be a cyber genius when you can just borrow from the best? Attackers are like the MacGyvers of the digital world, mixing and matching old tricks to create new mischief. NetSupport Manager? More like NetSupport Sneak Attack!

Key Points:

  • Attackers are using malicious MSIX packages to deploy preconfigured NetSupport clients.
  • These clients phone home to an attacker-controlled manager, providing remote communication.
  • NetSupport is a favored tool because it avoids the need to create custom command and control (C2) infrastructure.
  • These packages can remain under the radar due to low detection scores on platforms like VirusTotal.
  • NetSupport offers a 30-day free trial, which is more than enough time for attackers to launch their campaigns.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here