Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»ZPHP Campaign Delivering Remcos RAT Impacting SLTTs
    News

    ZPHP Campaign Delivering Remcos RAT Impacting SLTTs

    adminBy adminMarch 20, 2026No Comments8 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


     

    By: The Center for Internet Security® (CIS®) Cyber Threat Intelligence (CTI) team

    Published March 17, 2026

    Cyber Threat Intelligence thumbnail

    The Center for Internet Security® (CIS®) Cyber Threat Intelligence (CTI) team identified an ongoing ZPHP malware campaign impacting U.S. State, Local, Tribal, and Territorial (SLTT) government organizations that delivers the Remcos remote access trojan (RAT). Following a CIS Managed Detection and Response™ (CIS MDR™) alert involving the ClickFix technique, CIS CTI determined the campaign’s broader kill chain incorporated several common features across multiple malware families — namely, using fake CAPTCHAs and the ClickFix technique for remote access payload delivery. The team assesses it is highly likely similar campaigns will leverage ClickFix variants to impact SLTTs throughout 2026 due to the technique’s scalability, ease of implementation, and ability to compromise multiple victims quickly.

    ZPHP Campaigns’ Use of ClickFix and Fake CAPTCHAs

    malware loader iconZPHP, also known as SmartApeSG, is a JavaScript-based malware loader campaign that uses compromised websites to deliver malware or malicious remote access tools. Earlier campaigns have relied on fake browser update prompts, but activity observed at the time of publication primarily uses the ClickFix technique and a CAPTCHA page masquerading as a Cloudflare Turnstile verification prompt (Figure 1). These social engineering lures are designed to trick users into manually executing attacker‑supplied commands to deliver malware.

    Figure 1 Fake CAPTCHA Verification Steps

    Figure 1: Fake CAPTCHA Verification Steps

    Once they compromise a website, cyber threat actors (CTAs) embed hidden malicious JavaScript into the webpage. When specific conditions are met, such as using a Windows system, the malicious JavaScript executes replacing the webpage’s content with a fake CAPTCHA verification page with the prompt, “Verify you are human.” Once the victim clicks the prompt, the fake CAPTCHA instructs the victim to complete a series of steps for verification:

    1. Press hold the Win key + R
    2. In verification window, press Ctrl + V
    3. Press Enter on your keyboard

    These steps initiate the ZPHP kill chain by socially engineering the victim to run a command on their machine that reaches out to attacker-controlled infrastructure, retrieves an additional malicious script, and launches the next stage of the kill chain. Depending on the campaign, this step delivers the final payload, which has included the NetSupport remote access tool, Remcos RAT, and others.

    A Brief Note on the Remcos RAT

    Remcos stands for “Remote Control and Surveillance” and is an RAT sold as a remote access tool. Unlike other remote access tools, Remcos is marketed and sold as legitimate software by Breaking Security for remote management of Windows systems, as reported by Trend Micro, but it is almost exclusively used by cyber threat actors.

    Historical ZPHP Impact on SLTTs

    CIS CTI’s investigation into the activity identified through the initial CIS MDR alert revealed three additional SLTT organizations experienced similar ClickFix‑related alerts in February 2026. ZPHP malware campaigns are widespread and opportunistic. They’ve consistently appeared in CIS’s Quarterly Top 10 Malware list since the second quarter of 2024, highlighting their broad victim profile and scale. At the start of 2026, CIS’s Albert Network Monitoring and Management intrusion detection system (IDS) generated 61 alerts associated with ZPHP activity. Additionally, at the time of publication, the Malicious Domain Blocking and Reporting (MDBR) service of the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) has blocked nearly 500,000 DNS requests tied to the campaign across 162 member organizations.

    Technical Analysis of the ZPHP Campaign

    detection iconOn January 28, 2026, the 24x7x365 U.S.-based CIS Security Operations Center (SOC) alerted CIS CTI to a CIS MDR detection related to a ClickFix attack on an SLTT endpoint. The detection showed the end user had been socially engineered through a CAPTCHA page masquerading as a Cloudflare Turnstile CAPTCHA to run a malicious command from the Run window, as shown in Figure 2. Analysis of the command revealed an environment verification step that checks for the existence of notepad.exe in the System32 directory before executing mshta.exe. This is likely a defense evasion technique designed to identify sandbox environments and hinder analysis by ensuring the script only executes on legitimate victim hosts. CIS MDR successfully detected this activity, and the alert prompted CIS CTI to perform further investigation. The team analyzed the alert and pivoted off the IP address in the command to identify associated infrastructure, additional indicators of compromise (IOCs), and the payload delivered later in the kill chain.

    Figure 2 Script User copiedpasted into Run Window following the fake CAPTCHA verification steps

    Figure 2: Script User copied and pasted into Run Window following the fake CAPTCHA verification steps

    Kill Chain Analysis

    During investigation of the alert and command and control (C2) infrastructure, CIS CTI identified and analyzed the malicious JavaScript file, middleware-render.js, which is responsible for triggering the fake CAPTCHA and executing the ClickFix technique. The file’s name was likely chosen to blend in with common Node.js application structures, as the name “middleware.js” is a common filename across Node.js-based web applications.

    The JavaScript uses the React 19 and Tailwind CSS frameworks, and it is injected into Node.js-based architectures. The script checks the client-side environment for specific conditions that must be met before populating the fake CAPTCHA. The first condition is the victim must be using a Windows System, as shown in Figure 3.

    Figure 3 JavaScript Windows ConditionFigure 3: JavaScript Windows Condition

    The second condition is that the visiting machine must be either visiting the site for the first time or have visited it in the last 27.5 days (Figure 4). However, despite meeting these conditions during analysis, CIS CTI could not replicate the fake CAPTCHA likely due to server-side gating logic to evade virtualized analysis and prevent reinfection. When all the conditions are met, the script removes all existing CSS on the page, replacing the website’s content with the fake CAPTCHA.

    Figure 4 JavaScript Time Condition

    Figure 4: JavaScript Time Condition

    CIS CTI’s analysis of the C2 infrastructure at 193.42.38[.]42 identified the next-stage payload, an HTA file named “rate.” If the attack succeeded, this HTA file would have downloaded and delivered the payload from the mshta.exe execution triggered by the clipboard-injected command. The HTA file contained JavaScript that when executed by mshta.exe immediately hides its window, obtains full operating system (OS) access through a COM object, var shell = new ActiveXObject(“WScript.Shell”), and constructs a PowerShell script that runs in a hidden command prompt. The PowerShell script downloads a ZIP archive to the victim’s LOCALAPPDATA directory and saves it with a random six-digit filename and PDF extension. Once the PowerShell command is created, the HTA closes its window and the command prompt exits, leaving PowerShell running in the background.

    Although CIS CTI could not recover the complete PowerShell script, analysis of the C2 infrastructure indicates the ZIP archive would be downloaded from hxxp://193.42.38[.]42/limit.

    Payload Analysis

    As reported by Malware-Traffic-Analysis.net, the final payload is a large 38.38 MB ZIP archive containing over 90 files and is saved as “C:\Users\[username]\AppData\Local\[Random 6 Digit String].pdf” prior to extraction.Analysis shows the final payload is Remcos RAT hidden via steganography among the over 90 files, which are mostly legitimate DLL files from open-source and commercial software projects including Qt6, OpenSSL, and Intel TBB.

    CIS CTI identified four of the files in the ZIP archive as malicious: autohealth.dat,  ActionCenterHelper.dll, mega_altpllq.exe, and Multiple_Predict.dat. The file, Mega_altpllq.exe, is the primary executable and the trigger for DLL sideloading, while ActionCenterHelper.dll is a maliciously sideloaded DLL and is not digitally signed. Analysis reveals that it opens and reads the autohealth.dat, which contains the encrypted Remcos Rat payload disguised as PostgreSQL data, as well as contains logic to locate the encrypted payload, decrypt it in memory, and inject it, per Trend Micro.

    Remcos RAT is used for full system control; according to both Point Wild and MITRE ATT&CK, its capabilities include keylogging, screen and webcam capture, audio recording, file manipulation, credential theft, data exfiltration, and remote code execution. Once Remcos RAT is injected into memory, the malware establishes persistence through a scheduled task and a Windows registry Run key, both named Intel PLLQ Components, as shared by Malware-Traffic-Analysis.net. The use of Intel in these persistence mechanisms mimics legitimate Intel processor components, reducing the likelihood of detection.

    When the Remcos RAT has gained persistence in the victim’s system, it beacons to its C2 server over HTTPs using a self-signed certificate. The Remcos C2 IP addresses rotate frequently, notes Malware-Traffic-Analysis.net, with one observed example including 192.144.56[.]80:443.

    Defend against ZPHP and Remcos RAT

    threat activity iconTo strengthen your cyber defenses against ZPHP and Remcos RAT, you can join the MS-ISAC, a community dedicated to the collective defense of U.S. SLTTs. Members received early reporting on the ZPHP malware campaign discussed above, including over 400 IOCs disseminated through the CIS Indicator Sharing Program, and they received a more in-depth report, including specific incident response findings and additional IOCs. Members also receive support through services like MDBR to take a proactive approach to defending against malware like ZPHP.

    Ready to start receiving actionable threat intelligence that directly supports your proactive defense and informed decision-making?


    About the Author: The CIS Cyber Threat Intelligence (CTI) team at the Multi-State Infrastructure Information Sharing and Analysis Center (MS-ISAC®) functions as the premier CTI source for all U.S. State, Local, Tribal, and Territorial (SLTT) entities and election offices.With decades of combined experience in all types of industries, the CIS CTI team pushes out curated SLTT-centric threat intelligence reporting as well as malicious indicators via near real-time threat feeds. This information helps SLTTs anticipate and proactively defend against emerging cyber threats and shifts in adversarial tactics, techniques, and procedures. Additional information: team tradecraft and indicator feeds.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Articlemod_gnutls Multiple Vulnerabilities – Research Advisory
    Next Article VU#976247: Retraction of "Antivirus and Endpoint Detection and Response Archive Scanning Engines may not properly scan malformed ZIP archives"
    admin
    • Website

    Related Posts

    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    News

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.