JS#SMUGGLER Campaign Exploits Compromised Websites to Distribute NetSupport RAT
- Dec 8, 2025
- 2 min read
Key Findings
Securonix researchers discovered a new malware campaign dubbed JS#SMUGGLER that delivers the powerful NetSupport RAT through compromised websites.
The attack is designed in three stages to evade detection, starting with an obfuscated JavaScript loader, followed by a hidden HTML Application (HTA) and a final PowerShell payload that downloads and executes the NetSupport RAT.
The multi-layered tactics, including encryption, compression, and in-memory execution, indicate a highly sophisticated and actively maintained malware framework.
The campaign targets enterprise users through compromised websites, suggesting a broad-strokes effort to infect a wide range of victims.
Background
The JS#SMUGGLER campaign is the latest in a series of advanced malware operations analyzed by the Securonix Threat Research team, which includes analysts Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee. The researchers have also recently uncovered another multi-stage malspam campaign dubbed CHAMELEON#NET that delivers the Formbook information stealer.
Infection Chain
The JS#SMUGGLER attack is designed in three stages:
1. Obfuscated JavaScript Loader: The campaign starts with an obfuscated JavaScript script, typically loaded from sites like boriver.com, which checks the user's device and proceeds with the full infection if it detects a desktop.
2. Hidden HTML Application (HTA): The second stage involves a secret HTA file that runs completely unseen using the standard Windows program mshta.exe. This HTA contains heavily protected code with multiple layers of encryption and compression to avoid detection.
3. NetSupport RAT Deployment: The final stage downloads and executes the main payload: the NetSupport RAT. The PowerShell code in this stage pulls a compressed file from a domain like kindstki.com and extracts it into a normal-looking folder to ensure persistence through a fake Startup shortcut.
Impact and Capabilities
The NetSupport RAT enables the attackers to gain full remote control over the victim's computer, including remote desktop access, file operations, command execution, data theft, and proxy capabilities. The sophisticated evasion techniques and the professional-grade nature of the malware framework strongly suggest this is an active and well-maintained operation.
Recommendations
To protect against such threats, users should carefully validate all software downloads and strengthen their endpoint defences to detect suspicious script activity and unauthorized process execution. Security teams should deploy strong Content Security Policy (CSP) enforcement, script monitoring, PowerShell logging, mshta.exe restrictions, and behavioral analytics to effectively detect and mitigate such advanced attacks.
Sources
https://hackread.com/jssmuggler-netsupport-rat-infected-sites/
https://thehackernews.com/2025/12/experts-confirm-jssmuggler-uses.html


Comments