243. NetSupport RAT: The Most Prevalent Threat of August 2025

Hello everyone!

Remote Access Tools (T1219) is still a very common technique observed in many campaigns and incidents. According to Red Canary's Intelligence Insights for August 2025, the most prevalent threat was NetSupport RAT, so let's look at various detection opportunities.

As always, adversaries may rename executables. So we can search for rename NetSupport executables:

event_type: "processcreatewin"

AND

proc_file_productname: "netsupport"

AND NOT

proc_file_path: "client32.exe"

Next thing, normally the RAT should start from the Program Files directory, so we can search for running it from other folders:

event_type: "processcreatewin"

AND

proc_file_path: "client32.exe"

AND NOT

proc_file_path: "program files"

Finally, we can look for network indicators:

event_type: "dnsreqwin"

AND

dns_rname: "netsupportsoftware.com"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge