Stay updated with the latest Cybersecurity News on our TecnetBlog.

EVALUSION: The Malware That Tricks You Into Installing It

Written by Scarlet Mendoza | Nov 18, 2025 5:31:43 PM

In recent months, a particularly dangerous malware campaign has emerged that involves you in the attack itself: EVALUSION, an operation that blends social engineering with info-stealing and remote access tools. At TecnetOne, we’ll explain how it works, why it’s spreading so fast, and what you can do to protect yourself.

This campaign was analyzed by researchers at eSentire, who confirmed it's an evolution of the known ClickFix technique—an attack vector where cybercriminals convince users to paste malicious commands into the Windows Run window under the guise of solving a CAPTCHA or completing a “security check.”

Yes, the user unknowingly becomes the installer of the malware.

And as you can guess, that leaves your system wide open.

 

What Is ClickFix and Why Is It So Effective?

 

To understand EVALUSION, you first need to know about ClickFix—a method that’s gaining traction because it bypasses many security systems.

Attackers show a fake verification page, saying things like:

“To verify you’re human, copy and paste this into Windows + R.”

When you do that, you execute a malicious command that launches Windows processes like mshta.exe or PowerShell without your knowledge.

Since you are technically authorizing the action, antivirus and corporate protection tools often don’t flag it.

This is the foundation of EVALUSION.

 

Read more: EvilAI: The Malware Disguised as an AI Tool

 

What EVALUSION Installs: Amatera Stealer + NetSupport RAT

 

The campaign drops two primary tools:

 

Amatera Stealer

 

A next-gen info-stealer (successor to AcridRain), first seen in June 2025. It’s sold as a malware-as-a-service platform, with pricing from $199/month to $1,499/year.

Its most dangerous capabilities include:

 

  1. Browser password and session theft

 

  1. Crypto wallet access

 

  1. Email and messaging credential theft

 

  1. FTP credential extraction

 

  1. Stealthy, persistent data exfiltration

 

It also uses advanced evasion techniques:

 

  1. WoW64 SysCalls to bypass antivirus and EDR hooks

 

  1. PureCrypter-packed DLLs

 

  1. Injection into MSBuild.exe, a legitimate Windows process

 

In short: it hides where you’d never look.

 

NetSupport RAT

 

If Amatera steals your data, NetSupport RAT goes further—it gives attackers remote control of your machine.

Originally a legitimate remote support tool, NetSupport becomes a Remote Access Trojan (RAT) in criminal hands.

 

A Smart Campaign: They Only Target High-Value Victims

 

One of eSentire’s key findings: Amatera only installs NetSupport RAT if your device is considered valuable.

For example, if you:

 

  1. Are not in a corporate domain

 

  1. Don’t have sensitive or financial files

 

  1. Don’t appear to be a business user

 

The malware skips RAT deployment.

This approach helps attackers:

 

  1. Avoid noise

 

  1. Bypass detection

 

  1. Focus on high-value targets

 

It’s a surgical campaign designed to maximize profit and minimize risk.

 

Step-by-Step Breakdown of the Attack

 

The attack chain is clever and efficient:

 

  1. You land on a fake CAPTCHA or Cloudflare Turnstile screen

 

  1. It tells you to open Windows + R and paste a command

 

  1. That command runs mshta.exe, which fetches a PowerShell script

 

  1. The script downloads a file—often hosted on legit services like MediaFire

 

  1. Amatera Stealer is installed

 

  1. If your system is "valuable," NetSupport RAT is also deployed

 

The result?

 

  1. Your passwords

 

  1. Your active sessions

 

  1. Personal and work data

 

  1. Browsing history

 

  1. And, if needed, full control of your PC

 

All because you pasted a line thinking it was just a CAPTCHA check.

 

Amatera and NetSupport RAT (Source: BlackHat)

 

Related Campaigns: ClickFix Is Spreading

 

EVALUSION isn’t alone. Similar campaigns are abusing ClickFix with different malware:

 

  1. XWorm via fake invoice VBS files

 

  1. SmartApeSG, HANEYMANEY, ZPHP: fake Cloudflare verification pages

 

  1. Booking.com fake CAPTCHAs: target hotels to steal credentials

 

  1. “Blocked email” phishing: lead to fake portals to steal business data

 

ClickFix has become the new standard in digital deception.

 

You might also be interested in: The Evolution of Artificial Intelligence Driven Malware

 

How to Protect Yourself (and How TecnetOne Can Help)

 

At TecnetOne, we always stress: social engineering is dangerous because it exploits you, not a tech flaw. Protection starts with habits, not just tools.

 

Key Tips to Avoid ClickFix Attacks

 

  1. Never paste commands into Windows + R from a website

 

  1. Don’t trust CAPTCHA-like requests unless they match familiar patterns

 

  1. If a site asks you to run scripts—leave immediately

 

  1. Avoid clicking on links like “Cloudflare Verification” or “Blocked Message”

 

  1. Use EDR with behavior-based detection, not just traditional antivirus

 

  1. Enforce restrictions on mshta.exe, PowerShell, and unsigned scripts

 

For Organizations

 

At TecnetOne, we recommend deploying:

 

  1. Advanced web filtering

 

  1. Endpoint monitoring

 

  1. Blocking of LOLBins like mshta.exe

 

  1. Download controls for MediaFire, Dropbox, etc.

 

  1. Ongoing employee awareness training

 

In Summary

 

EVALUSION is a perfect case study in modern malware:

 

  1. No technical exploit needed

 

  1. You launch it yourself

 

  1. It uses advanced social engineering

 

  1. It targets only high-value victims

 

  1. It combines data theft and remote access

 

The best defense isn’t just software—it’s your ability to spot a trick in time.

If you’d like TecnetOne to review your current security posture, help harden your defenses, or run an employee awareness workshop, we’re here to help.