TAG-150 Develops CastleRAT in Python and C for Expanded Malware Operations
Summary
Hide ▲
Show ▼
TAG-150, a threat actor behind the CastleLoader malware-as-a-service (MaaS) framework, has developed a new remote access trojan (RAT) named CastleRAT. Available in both Python and C variants, CastleRAT can collect system information, execute commands, and download additional payloads. TAG-150 has been active since at least March 2025, using CastleLoader to deliver various secondary payloads, including other RATs, information stealers, and loaders. CastleRAT is part of a multi-tiered infrastructure and uses Steam Community profiles as dead drop resolvers for command-and-control (C2) servers. The C variant of CastleRAT includes additional functionalities such as keylogging, screenshot capture, and cryptocurrency clipping. The threat actor employs phishing attacks and fraudulent GitHub repositories to initiate infections. Recent developments include the discovery of TinyLoader, TinkyWinkey, and Inf0s3c Stealer, which are used to deliver additional malware and steal information. CastleLoader has been linked to a Play Ransomware attack against a French organization, and TAG-150 operates with a limited and sophisticated user base, likely promoting its services within closed circles.
Timeline
-
05.09.2025 17:07 2 articles · 24d ago
TAG-150 Develops CastleRAT in Python and C
TAG-150 has been active since at least March 2025, with CastleLoader used in over 1,600 attacks, resulting in nearly 470 successful infections. The threat actor targets critical infrastructure, including a significant number of U.S. government agencies. CastleLoader has been linked to a Play Ransomware attack against a French organization. The C variant of CastleRAT includes features such as a clipper, keylogger, screen capturer, and the ability to terminate browser processes. The Python variant, named PyNightshade, uses UAC Prompt Bombing to bypass security protections and evade sandbox solutions. The article also reveals the sophisticated user base of TAG-150, operating within closed circles, and the potential for future malware development and distribution efforts.
Show sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
Information Snippets
-
TAG-150, the threat actor behind CastleLoader, has developed CastleRAT, a new remote access trojan available in both Python and C variants.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
CastleRAT can collect system information, execute commands via CMD and PowerShell, and download additional payloads.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
TAG-150 has been active since at least March 2025, using CastleLoader to deliver various secondary payloads.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
CastleLoader has been used to distribute DeerStealer, RedLine, StealC, NetSupport RAT, SectopRAT, Hijack Loader, MonsterV2, and WARMCOOKIE.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
Infections are initiated through Cloudflare-themed 'ClickFix' phishing attacks or fraudulent GitHub repositories.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
CastleRAT uses Steam Community profiles as dead drop resolvers for C2 servers.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
The C variant of CastleRAT includes keylogging, screenshot capture, file upload/download, and cryptocurrency clipping functionalities.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
Recent iterations of the C variant of CastleRAT have removed querying of city and ZIP code from ip-api[.]com, indicating active development.
First reported: 05.09.2025 17:071 source, 1 articleShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
-
eSentire tracks the same malware under the name NightshadeC2, describing it as a botnet deployed via a .NET loader.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
NightshadeC2 uses UAC Prompt Bombing to bypass security protections and evade sandbox solutions.
First reported: 05.09.2025 17:071 source, 1 articleShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
-
TinyLoader, TinkyWinkey, and Inf0s3c Stealer are new malware families discovered alongside CastleRAT.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
TAG-150 has been active since at least March 2025, with CastleLoader used in over 1,600 attacks, resulting in nearly 470 successful infections.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
TAG-150 has targeted critical infrastructure, including a significant number of U.S. government agencies.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
CastleLoader has been linked to a Play Ransomware attack against a French organization.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
TAG-150 operates with a limited and sophisticated user base, likely promoting its services within closed circles.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
The C variant of CastleRAT includes features such as a clipper, keylogger, screen capturer, and the ability to terminate browser processes.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
The Python variant of CastleRAT, named PyNightshade, uses UAC Prompt Bombing to bypass security protections and evade sandbox solutions.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
TAG-150 is likely to develop and release additional malware in the near term and expand its distribution efforts.
First reported: 05.09.2025 21:281 source, 1 articleShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
Similar Happenings
Transparent Tribe Targets Indian Government with Dual-Platform Malware Campaign
APT36, also known as Transparent Tribe, is targeting both Windows and BOSS Linux systems in ongoing attacks against Indian government and defense entities. The campaign, active since August 1, 2025, involves phishing emails delivering malicious .desktop files disguised as PDFs. The malware facilitates data exfiltration, persistent espionage access, and includes anti-debugging and anti-sandbox checks. The malware also targets the Kavach 2FA solution used by Indian government agencies. The attack leverages the .desktop file's 'Exec=' field to execute a sequence of shell commands that download and run a Go-based ELF payload. The payload establishes persistence through cron jobs and systemd services, and communicates with a C2 server via a WebSocket channel. The technique allows APT36 to evade detection by abusing a legitimate Linux feature that is not typically monitored for threats. The campaign demonstrates APT36's evolving tactics, becoming more evasive and sophisticated.
QuirkyLoader Malware Distributes Multiple Payloads via Email Spam Campaigns
A new malware loader, QuirkyLoader, has been observed in email spam campaigns since November 2024. It delivers various payloads, including Agent Tesla, AsyncRAT, and Snake Keylogger. The loader uses DLL side-loading and process hollowing techniques to inject malware into legitimate processes. Two recent campaigns targeted Taiwan and Mexico, focusing on specific organizations and random infections, respectively. The malware employs advanced evasion tactics, such as .NET AOT compilation, and has been used in limited campaigns since July 2025. Additionally, new phishing trends, including QR code phishing and precision-validated phishing, have been observed, highlighting the evolving tactics of threat actors.