GrayAlpha Deploys NetSupport RAT to Organizations via Fake Browser Updates, 7-Zip Downloaders

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

GrayAlpha, a cybercriminal cluster linked to the notorious FIN7 group known for its sophisticated, financially driven campaigns, showcases advanced technical capabilities and operational persistence.  

The group has established new infrastructure for distributing malware, including domains tied to payload delivery and custom PowerShell loaders such as PowerNet and MaskBat. 

Leveraging diverse infection methods, GrayAlpha has employed fake browser update pages, fraudulent 7-Zip download sites, and its previously undocumented TAG-124 traffic distribution system (TDS).  

GrayAlpha using three different infection vectors, all leading to NetSupport RAT infections
GrayAlpha using three different infection vectors, all leading to NetSupport RAT infections | Source: Recorded Future

Recent findings from Insikt Group say that currently, only the fake 7-Zip download sites remain active, with newly registered domains identified as recently as April 2025. 

These deceptive vectors ultimately deploy the widely abused Remote Access Trojan (RAT) called NetSupport RAT, enabling remote control over infected systems.  

GrayAlpha employs unique tools such as PowerNet and an obfuscated loader, MaskBat, exhibiting advanced sophistication.

Fake browser updates, TAG-124 TDS, and fraudulent software pages like Advanced IP Scanner–themed domains are used, illustrating innovation in attack strategies.  

Domains tied to GrayAlpha’s activities remain active, signaling ongoing risks to organizations and individuals. Companies are urged to adopt proactive defense strategies to mitigate risks.  

The most prominent RAT infection in recent days was a multi-stage AsyncRAT and Skuld Stealer campaign that leveraged hijacked Discord links.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: