“##y ( '! cf0joaxml! ', '! wfheyhkmz! ' ) " figure 8 : powershell command ( source : cybereason ) netsupport rat launch and persistence. the batch file starts client32. exe and sets a run registry key to automatically relaunch the netsupport rat client at startup, establishing per…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
97%
“technique, insikt group observed a return to fake browser updates as early as october 12, 2025. figure 5 provides an overview of attack chain 1. figure 5 : attack chain 1 ( source : recorded future ) website compromise and lure delivery. threat actors modify legitimate sites to l…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.004Malicious Copy and Paste
91%
“links on gaming sites direct users to compromised wordpress pages that embed attacker javascript. background script and profiling. a background script loads when the site is visited, injects an iframe, and profiles the environment ( such as the operating system and browser ) to d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1584.001Domains
82%
“graycharlie hijacks law firm sites in suspected supply - chain attack executive summary insikt group has been monitoring graycharlie, a threat actor overlapping with smartapesg and active since mid - 2023, for some time, and is now publishing its first report on the group. graych…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
74%
“technique, insikt group observed a return to fake browser updates as early as october 12, 2025. figure 5 provides an overview of attack chain 1. figure 5 : attack chain 1 ( source : recorded future ) website compromise and lure delivery. threat actors modify legitimate sites to l…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
52%
“links on gaming sites direct users to compromised wordpress pages that embed attacker javascript. background script and profiling. a background script loads when the site is visited, injects an iframe, and profiles the environment ( such as the operating system and browser ) to d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.001Malware
51%
“or early april 2025, smartapesg shifted from using fake browser updates to deploying clickfix lures, mirroring a broader trend among threat actors of increasingly adopting clickfix. graycharlie predominantly delivers netsupport rat ; however, deployments of stealc and, more recen…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
49%
“links on gaming sites direct users to compromised wordpress pages that embed attacker javascript. background script and profiling. a background script loads when the site is visited, injects an iframe, and profiles the environment ( such as the operating system and browser ) to d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
45%
“443 linked to graycharlie within a controlled environment. later that day, approximately three hours later, the threat actor connected using netsupport rat, compressed and moved two files, and then executed group and account reconnaissance commands. the same actor returned three …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.002SMB/Windows Admin Shares
44%
“the external javascript hosted at hxxps : / / persistancejs [. ] store / work / original [. ] js ( see table 6 ). insikt group assesses that graycharlie ( or the third party graycharlie works with ) likely compromised these websites through a supply - chain vector. one potential …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
44%
“##vocloud, the group ’ s core behaviors have remained consistent. given its sustained activity, graycharlie is highly likely to remain active and continue targeting organizations worldwide, with a current emphasis on us entities, as indicated by recorded future network intelligen…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1584.004Server
42%
“graycharlie hijacks law firm sites in suspected supply - chain attack executive summary insikt group has been monitoring graycharlie, a threat actor overlapping with smartapesg and active since mid - 2023, for some time, and is now publishing its first report on the group. graych…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
42%
“an id parameter ( such as hxxps : / / signaturepl [. ] com / work / index [. ] php? abje2law ). notably, these urls are updated over time by the threat actor, complicating detection and indicating the threat actor maintains ongoing access to a large pool of compromised wordpress …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
40%
“the certificate with the common name june6 linked to 94 [. ] 158 [. ] 245 [. ] 174 was created only 20 seconds later. cluster 2 cluster 2 comprises netsupport rat command - and - control servers whose tls certificates typically start with two or more repetitions of “ s ”, followe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
39%
“port 443. overall, insikt group assesses that graycharlie relies extensively on proxy services to administer its infrastructure. additionally, based on presumed browsing activity from higher - tier servers, at least some individuals linked to graycharlie are assessed to be russia…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
36%
“november 2025, possibly through a supply - chain compromise involving a shared it provider. to protect against graycharlie, security defenders should block ip addresses and domains tied to associated remote access trojans ( rats ) and infostealers, flag and potentially block conn…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1189Drive-by Compromise
34%
“this includes netsupport rat command - and - control ( c2 ) servers, staging infrastructure made up of both actor - controlled and compromised infrastructure, as well as components of graycharlie ’ s higher - tier infrastructure used to manage its operations. insikt group identif…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
32%
“november 2025, possibly through a supply - chain compromise involving a shared it provider. to protect against graycharlie, security defenders should block ip addresses and domains tied to associated remote access trojans ( rats ) and infostealers, flag and potentially block conn…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.001Malicious Link
31%
“links on gaming sites direct users to compromised wordpress pages that embed attacker javascript. background script and profiling. a background script loads when the site is visited, injects an iframe, and profiles the environment ( such as the operating system and browser ) to d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.