{"id":1917,"date":"2026-03-14T02:01:09","date_gmt":"2026-03-14T02:01:09","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/"},"modified":"2026-03-14T02:01:09","modified_gmt":"2026-03-14T02:01:09","slug":"smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/","title":{"rendered":"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)"},"content":{"rendered":"<div>\n<p><em><strong>Introduction<\/strong><\/em><\/p>\n<p>This diary describes a Remcos RAT infection that I generated in my lab on Thursday, 2026-03-11. This infection was from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page.<\/p>\n<p>My previous in-depth diary about a SmartApeSG (ZPHP, HANEYMANEY)\u00a0was i<a href=\"https:\/\/isc.sans.edu\/diary\/SmartApeSG+campaign+uses+ClickFix+page+to+push+NetSupport+RAT\/32474\">n November 2025<\/a>, when I saw NetSupport Manager RAT. Since then, I&#8217;ve fairly consistently seen what appears to be Remcos RAT from this campaign.<\/p>\n<p><em><strong>Finding SmartApeSG Activity<\/strong><\/em><\/p>\n<p>As previously noted, I find SmartApeSG indicators from the <a href=\"https:\/\/infosec.exchange\/@monitorsg\">Monitor SG account<\/a> on Mastodon, and I use <a href=\"https:\/\/urlscan.io\/search\/#*\">URLscan<\/a> to pivot on those indicators to find compromised websites with injected SmartApeSG script.<\/p>\n<p><em><strong>Details<\/strong><\/em><\/p>\n<p>Below is an image of HTML in a page from a legitimate but compromised website that shows the injected SmartApeSG script.<\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01.jpg\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Page from a legitimate but compromised site that highlights the injected SmartApeSG script.<\/em><\/p>\n<p>The injected SmartApeSG script generates a fake CAPTCHA-style &#8220;verify you are human&#8221; page, which displays ClickFix-style instructions after checking a box on the page. A screenshot from this infection is shown below, and it notes the ClickFix-style script injected into the user&#8217;s clipboard. Users are instructed to open a run window, paste the script into it, and hit the Enter key.<\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-02.jpg\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-02a.jpg\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Fake CAPTCHA page generated by a legitimate but compromised site, showing the ClickFix-style command.<\/em><\/p>\n<p>I used Fiddler to reveal URLS from the HTTPS traffic, and I recorded the traffic and viewed it in Wireshark. Traffic from the infection chain is shown in the image below.<\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-03.jpg\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-03a.jpg\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Traffic from the infection in Fiddler and Wireshark.<\/em><\/p>\n<p>After running the ClickFix-style instructions, the malware was sent as a ZIP archive and saved to disk with a <span style=\"font-family:Courier New,Courier,monospace;\">.pdf<\/span> file extension. This appears to be Remcos RAT in a malicious package that uses DLL side-loading to run the malware. This infection was made persistent with an update to the Windows Registry.<\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-04.jpg\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-04a.jpg\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Malware from the infection persistent on an infected Windows host.<\/em><\/p>\n<p><em><strong>Indicators of Compromise<\/strong><\/em><\/p>\n<p>Injected SmartApeSG script injected into page from legitimate but compromised site:<\/p>\n<ul>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/cpajoliette[.]com\/d.js<\/span><\/li>\n<\/ul>\n<p>Traffic to domain hosting the fake CAPTCHA page:<\/p>\n<ul>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/retrypoti[.]top\/endpoint\/signin-cache.js<\/span><\/li>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/retrypoti[.]top\/endpoint\/login-asset.php?Iah0QU0N<\/span><\/li>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/retrypoti[.]top\/endpoint\/handler-css.js?00109a4cb788daa811<\/span><\/li>\n<\/ul>\n<p>Traffic generated by running the ClickFix-style script:<\/p>\n<ul>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxp[:]\/\/forcebiturg[.]com\/boot<\/span>\u00a0 &lt;&#8211; 302 redirect to HTTPS URL<\/li>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/forcebiturg[.]com\/boot<\/span>\u00a0 &lt;&#8211; returned HTA file<\/li>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxp[:]\/\/forcebiturg[.]com\/proc<\/span>\u00a0 &lt;&#8211; 302 redirect to HTTPS URL<\/li>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/forcebiturg[.]com\/proc<\/span>\u00a0 &lt;&#8211; returned ZIP archive archive with files for Remcos RAT<\/li>\n<\/ul>\n<p>Post-infection traffic for Remcos RAT:<\/p>\n<ul>\n<li><span style=\"font-family:Courier New,Courier,monospace;\">193.178.170[.]155:443<\/span> &#8211; TLSv1.3 traffic using self-signed certificate<\/li>\n<\/ul>\n<p>Example of ZIP archive for Remcos RAT:<\/p>\n<ul>\n<li>SHA256 hash: <span style=\"font-family:Courier New,Courier,monospace;\">b170ffc8612618c822eb03030a8a62d4be8d6a77a11e4e41bb075393ca504ab7<\/span><\/li>\n<li>File size: 92,273,195 bytes<\/li>\n<li>File type: Zip archive data, at least v2.0 to extract, compression method=deflate<\/li>\n<li>Example of saved file location: <span style=\"font-family:Courier New,Courier,monospace;\">C:Users[username]AppDataLocalTemp594653818594653818.pdf<\/span><\/li>\n<\/ul>\n<p>Of note, the files, URLs and domains for SmartApeSG activity change on a near-daily basis, and the indicators described in this article are likely no longer current. However, the overall patterns of activity for SmartApeSG have remained fairly consistent over the past several months.<\/p>\n<p>&#8212;<br \/>\nBradley Duncan<br \/>\nbrad [at] malware-traffic-analysis.net<\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction This diary describes a Remcos RAT infection that I generated in my lab on Thursday, 2026-03-11. This infection was from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page. My previous in-depth diary about a SmartApeSG (ZPHP, HANEYMANEY)\u00a0was in November 2025, when I saw NetSupport Manager RAT. Since then, I&#8217;ve fairly consistently seen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-1917","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Introduction This diary describes a Remcos RAT infection that I generated in my lab on Thursday, 2026-03-11. This infection was from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page. My previous in-depth diary about a SmartApeSG (ZPHP, HANEYMANEY)\u00a0was in November 2025, when I saw NetSupport Manager RAT. Since then, I&#8217;ve fairly consistently seen [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-14T02:01:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)\",\"datePublished\":\"2026-03-14T02:01:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\"},\"wordCount\":562,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\",\"name\":\"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg\",\"datePublished\":\"2026-03-14T02:01:09+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage\",\"url\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg\",\"contentUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/","og_locale":"en_US","og_type":"article","og_title":"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th) - Imperative Business Ventures Limited","og_description":"Introduction This diary describes a Remcos RAT infection that I generated in my lab on Thursday, 2026-03-11. This infection was from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page. My previous in-depth diary about a SmartApeSG (ZPHP, HANEYMANEY)\u00a0was in November 2025, when I saw NetSupport Manager RAT. Since then, I&#8217;ve fairly consistently seen [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-03-14T02:01:09+00:00","og_image":[{"url":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)","datePublished":"2026-03-14T02:01:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/"},"wordCount":562,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/","name":"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg","datePublished":"2026-03-14T02:01:09+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#primaryimage","url":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg","contentUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-03-14-ISC-diary-image-01a.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/14\/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1917"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1917\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}