243. NetSupport RAT: The Most Prevalent Threat of August 2025
Hello everyone!
Remote Access Tools (T1219) is still a very common technique observed in many campaigns and incidents. According to Red Canary's Intelligence Insights for August 2025, the most prevalent threat was NetSupport RAT, so let's look at various detection opportunities.
As always, adversaries may rename executables. So we can search for rename NetSupport executables:
event_type: "processcreatewin"
AND
proc_file_productname: "netsupport"
AND NOT
proc_file_path: "client32.exe"
Next thing, normally the RAT should start from the Program Files directory, so we can search for running it from other folders:
event_type: "processcreatewin"
AND
proc_file_path: "client32.exe"
AND NOT
proc_file_path: "program files"
Finally, we can look for network indicators:
event_type: "dnsreqwin"
AND
dns_rname: "netsupportsoftware.com"
See you tomorrow!
Comments
Post a Comment