Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    HR Chief Ideas and Greatest Practices

    February 24, 2026

    The MCP Revolution and the Seek for Steady AI Use Circumstances

    February 24, 2026

    GrayCharlie Hacks WordPress Websites, Spreads NetSupport RAT and Stealc Malware

    February 24, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»GrayCharlie Hacks WordPress Websites, Spreads NetSupport RAT and Stealc Malware
    AI Ethics & Regulation

    GrayCharlie Hacks WordPress Websites, Spreads NetSupport RAT and Stealc Malware

    Declan MurphyBy Declan MurphyFebruary 24, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    GrayCharlie Hacks WordPress Websites, Spreads NetSupport RAT and Stealc Malware
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    GrayCharlie is abusing compromised WordPress websites to silently load malicious JavaScript that pushes NetSupport RAT, usually adopted by Stealc and SectopRAT, by way of faux browser updates and ClickFix lures.

    Insikt Group tracks GrayCharlie as a financially motivated menace actor overlapping with SmartApeSG, energetic since mid‑2023, and specializing in turning legit WordPress websites into malware-delivery factors.

    The actor injects hyperlinks to externally hosted JavaScript into compromised pages, which then redirect guests to faux browser-update pages or ClickFix-style social engineering flows that finally ship the NetSupport RAT.

    As soon as NetSupport is put in and linked to attacker‑managed C2 servers, GrayCharlie operators achieve distant entry for surveillance, file operations, and comply with‑on payload supply, together with infostealer Stealc and distant entry malware SectopRAT.

    Insikt Group stories that GrayCharlie operates a large, layered infrastructure footprint, closely focused on suppliers MivoCloud and HZ Internet hosting Ltd.

    This contains devoted NetSupport RAT C2 servers, staging servers internet hosting the malicious JavaScript templates, and better‑tier techniques used to manage campaigns, usually accessed by way of proxy providers.

    Overview of GrayCharlie clusters noticed in 2025 (Supply : Insikt Group).

    The group’s exercise stays constant throughout campaigns, with recurring use of the identical an infection chains, license keys, and TLS certificates patterns on its C2 infrastructure.

    Pretend Updates, ClickFix, and Regulation Agency

    Initially, GrayCharlie relied totally on faux browser replace overlays, which seem tailor-made to Chrome, Edge, or Firefox and immediate customers to obtain a supposed replace bundle that’s really a JavaScript pushed NetSupport installer.

    The IP addresses related to the staging infrastructure are linked to web sites impersonating “Wiser College” a fictional entity used to display Wiser, a free Bootstrap HTML5 schooling.

    Website impersonating “Wiser University” (Source : Insikt Group).
    Web site impersonating “Wiser College” (Supply : Insikt Group).

    The loader script launches by way of WScript, phases PowerShell, downloads and extracts the NetSupport consumer into places resembling %AppData%, provides Registry Run keys for persistence, after which beaconing to GrayCharlie‑managed C2 servers.

    In 2025, the actor expanded to a ClickFix move, the place compromised WordPress pages show a faux CAPTCHA that copies a PowerShell‑primarily based command to the clipboard and instructs customers to execute it utilizing the Home windows Run dialog, once more leading to NetSupport RAT set up and persistence.

    Most sufferer websites seem opportunistically compromised throughout many sectors, however Insikt Group additionally highlights a notable cluster of US legislation agency WordPress websites that started loading malicious JavaScript from GrayCharlie‑managed infrastructure round November 2025.

    Proof suggests these legislation agency websites might have been compromised by way of a provide‑chain vector involving a shared IT or advertising supplier, with SMB Crew cited as a probable avenue on account of its branding and shared credentials surfacing across the time the malicious infrastructure grew to become energetic.

    
Website of Gerling Law Injury Attorneys (top) and SMBTeam logo (bottom) (Source : Insikt Group).
    Web site of Gerling Regulation Harm Attorneys (prime) and SMBTeam emblem (backside) (Supply : Insikt Group).

    Whereas GrayCharlie’s final targets stay unclear, present telemetry factors to information theft, monetary achieve, and probably promoting or sharing entry with different menace actors, underlining the chance to authorized and different excessive‑worth targets.

    Mitigations

    Insikt Group advises defenders to aggressively block IP addresses and domains tied to NetSupport RAT, Stealc, SectopRAT, and different instruments utilized in GrayCharlie operations, and to deal with site visitors to identified‑compromised WordPress websites as excessive‑danger till remediated.

    The web page presents a faux CAPTCHA that quietly copies a malicious command to the person’s clipboard and instructs them to stick it into the Home windows Run dialog (Win+R).

    Fake Captcha (Source : Insikt Group).
    Pretend Captcha (Supply : Insikt Group).

    Safety groups ought to deploy up to date YARA, Snort, and Sigma guidelines to detect NetSupport parts, ClickFix‑model instructions, and GrayCharlie’s JavaScript and PowerShell loader patterns, together with in historic logs.

    Extra beneficial controls embrace tightening e mail and net filtering, monitoring for suspicious information exfiltration to identified malicious infrastructure, and constantly ingesting new GrayCharlie menace intelligence sources to maintain detection and blocking insurance policies present.

    Observe us on Google Information, LinkedIn, and X to Get Prompt Updates and Set GBH as a Most popular Supply in Google.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Hacker stiehlt Daten von Tausenden RTL-Mitarbeitern

    February 23, 2026

    Hackers Use Excel Exploit to Disguise XWorm 7.2 in JPEG Information, Hijack PCs

    February 23, 2026

    Anthropic Launches Claude Code Safety for AI-Powered Vulnerability Scanning

    February 23, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    HR Chief Ideas and Greatest Practices

    By Charlotte LiFebruary 24, 2026

    Up to date January 29, 2026 The office evolves quickly, and with it, roles, duties,…

    The MCP Revolution and the Seek for Steady AI Use Circumstances

    February 24, 2026

    GrayCharlie Hacks WordPress Websites, Spreads NetSupport RAT and Stealc Malware

    February 24, 2026

    Save $650 on the ultra-lightweight LG Gram Professional

    February 24, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.