GrayBravo Expands CastleLoader Malware Operations with Four Threat Clusters
Summary
Hide ▲
Show ▼
GrayBravo, previously tracked as TAG-150, has developed CastleRAT, a remote access trojan available in both Python and C variants. The threat actor is characterized by rapid development cycles, technical sophistication, and an expansive, evolving infrastructure. GrayBravo has been active since at least March 2025, using CastleLoader to deliver various secondary payloads, including other RATs, information stealers, and loaders. CastleRAT is part of a multi-tiered infrastructure and uses Steam Community profiles as dead drop resolvers for command-and-control (C2) servers. The C variant of CastleRAT includes additional functionalities such as keylogging, screenshot capture, and cryptocurrency clipping. The threat actor employs phishing attacks and fraudulent GitHub repositories to initiate infections. Recent developments include the discovery of TinyLoader, TinkyWinkey, and Inf0s3c Stealer, which are used to deliver additional malware and steal information. CastleLoader has been linked to a Play Ransomware attack against a French organization, and GrayBravo operates with a limited and sophisticated user base, likely promoting its services within closed circles. Four distinct threat activity clusters have been observed leveraging CastleLoader: TAG-160, TAG-161, and two unnamed clusters. TAG-160 targets the logistics sector using phishing and ClickFix techniques, while TAG-161 uses Booking.com-themed ClickFix campaigns to distribute CastleLoader and Matanbuchus 3.0. The third cluster uses infrastructure impersonating Booking.com in conjunction with ClickFix and Steam Community pages as a dead drop resolver to deliver CastleRAT via CastleLoader. The fourth cluster uses malvertising and fake software update lures masquerading as Zabbix and RVTools to distribute CastleLoader and NetSupport RAT. GrayBravo leverages a multi-tiered infrastructure to support its operations, including Tier 1 victim-facing C2 servers and multiple VPS servers as backups. A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. LummaStealer, also known as LummaC2, is an infostealer operation running as a malware-as-a-service (MaaS) platform that was disrupted in May 2025 when multiple tech firms and law enforcement authorities seized 2,300 domains and the central command structure supporting the malicious service. Although the law enforcement operation severely disrupted the LummaStealer activity, the MaaS operation started to resume in July 2025. A new report from cybersecurity company Bitdefender warns that LummaStealer operations have scaled significantly between December 2025 and January 2026, now being delivered through a malware loader called CastleLoader, and increasingly relying on ClickFix techniques.
Timeline
-
09.12.2025 18:01 2 articles · 2mo ago
GrayBravo characterized by rapid development cycles and evolving infrastructure
GrayBravo, previously tracked as TAG-150, is characterized by rapid development cycles, technical sophistication, responsiveness to public reporting, and an expansive, evolving infrastructure. The threat actor's toolset includes CastleRAT and CastleBot, which comprises a shellcode stager/downloader, a loader, and a core backdoor. The CastleBot loader injects a core module that contacts its C2 server to retrieve tasks enabling it to download and execute DLL, EXE, and PE payloads.
Show sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
05.09.2025 17:07 5 articles · 5mo ago
TAG-150 Develops CastleRAT in Python and C
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. LummaStealer, also known as LummaC2, is an infostealer operation running as a malware-as-a-service (MaaS) platform that was disrupted in May 2025 when multiple tech firms and law enforcement authorities seized 2,300 domains and the central command structure supporting the malicious service. Although the law enforcement operation severely disrupted the LummaStealer activity, the MaaS operation started to resume in July 2025. A new report from cybersecurity company Bitdefender warns that LummaStealer operations have scaled significantly between December 2025 and January 2026, now being delivered through a malware loader called CastleLoader, and increasingly relying on ClickFix techniques.
Show sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
Information Snippets
-
TAG-150, the threat actor behind CastleLoader, has developed CastleRAT, a new remote access trojan available in both Python and C variants.
First reported: 05.09.2025 17:073 sources, 4 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
CastleRAT can collect system information, execute commands via CMD and PowerShell, and download additional payloads.
First reported: 05.09.2025 17:073 sources, 4 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
TAG-150 has been active since at least March 2025, using CastleLoader to deliver various secondary payloads.
First reported: 05.09.2025 17:073 sources, 4 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
CastleLoader has been used to distribute DeerStealer, RedLine, StealC, NetSupport RAT, SectopRAT, Hijack Loader, MonsterV2, and WARMCOOKIE.
First reported: 05.09.2025 17:072 sources, 3 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
-
Infections are initiated through Cloudflare-themed 'ClickFix' phishing attacks or fraudulent GitHub repositories.
First reported: 05.09.2025 17:073 sources, 4 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
CastleRAT uses Steam Community profiles as dead drop resolvers for C2 servers.
First reported: 05.09.2025 17:073 sources, 4 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
The C variant of CastleRAT includes keylogging, screenshot capture, file upload/download, and cryptocurrency clipping functionalities.
First reported: 05.09.2025 17:073 sources, 3 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
Recent iterations of the C variant of CastleRAT have removed querying of city and ZIP code from ip-api[.]com, indicating active development.
First reported: 05.09.2025 17:071 source, 1 articleShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
-
eSentire tracks the same malware under the name NightshadeC2, describing it as a botnet deployed via a .NET loader.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
-
NightshadeC2 uses UAC Prompt Bombing to bypass security protections and evade sandbox solutions.
First reported: 05.09.2025 17:072 sources, 2 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
TinyLoader, TinkyWinkey, and Inf0s3c Stealer are new malware families discovered alongside CastleRAT.
First reported: 05.09.2025 17:073 sources, 3 articlesShow sources
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations — thehackernews.com — 05.09.2025 17:07
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
TAG-150 has been active since at least March 2025, with CastleLoader used in over 1,600 attacks, resulting in nearly 470 successful infections.
First reported: 05.09.2025 21:283 sources, 3 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
TAG-150 has targeted critical infrastructure, including a significant number of U.S. government agencies.
First reported: 05.09.2025 21:282 sources, 2 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
-
CastleLoader has been linked to a Play Ransomware attack against a French organization.
First reported: 05.09.2025 21:283 sources, 3 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
TAG-150 operates with a limited and sophisticated user base, likely promoting its services within closed circles.
First reported: 05.09.2025 21:283 sources, 3 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
The C variant of CastleRAT includes features such as a clipper, keylogger, screen capturer, and the ability to terminate browser processes.
First reported: 05.09.2025 21:282 sources, 2 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
The Python variant of CastleRAT, named PyNightshade, uses UAC Prompt Bombing to bypass security protections and evade sandbox solutions.
First reported: 05.09.2025 21:282 sources, 2 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
TAG-150 is likely to develop and release additional malware in the near term and expand its distribution efforts.
First reported: 05.09.2025 21:282 sources, 2 articlesShow sources
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT' — www.darkreading.com — 05.09.2025 21:28
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
GrayBravo, previously tracked as TAG-150, is characterized by rapid development cycles, technical sophistication, responsiveness to public reporting, and an expansive, evolving infrastructure.
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
GrayBravo's toolset includes CastleRAT and CastleBot, which comprises a shellcode stager/downloader, a loader, and a core backdoor.
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The CastleBot loader injects a core module that contacts its C2 server to retrieve tasks enabling it to download and execute DLL, EXE, and PE payloads.
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Four distinct threat activity clusters have been observed leveraging CastleLoader: TAG-160, TAG-161, and two unnamed clusters.
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
TAG-160 targets the logistics sector using phishing and ClickFix techniques to distribute CastleLoader (Active since at least March 2025).
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
TAG-161 uses Booking.com-themed ClickFix campaigns to distribute CastleLoader and Matanbuchus 3.0 (Active since at least June 2025).
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The third cluster uses infrastructure impersonating Booking.com in conjunction with ClickFix and Steam Community pages as a dead drop resolver to deliver CastleRAT via CastleLoader (Active since at least March 2025).
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The fourth cluster uses malvertising and fake software update lures masquerading as Zabbix and RVTools to distribute CastleLoader and NetSupport RAT (Active since at least April 2025).
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
GrayBravo leverages a multi-tiered infrastructure to support its operations, including Tier 1 victim-facing C2 servers and multiple VPS servers as backups.
First reported: 09.12.2025 18:013 sources, 3 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
TAG-160 uses fraudulent or compromised accounts on freight-matching platforms to enhance the credibility of its phishing campaigns.
First reported: 09.12.2025 18:012 sources, 2 articlesShow sources
- Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure — thehackernews.com — 09.12.2025 18:01
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
-
A new malware campaign using a Python-based delivery chain to deploy the emerging CastleLoader family has been discovered by cybersecurity researchers.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The activity revolves around the use of ClickFix social engineering prompts that convince users to open the Windows Run dialog and execute a command that appears to be part of a harmless verification step.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
That single action initiates a multi-stage sequence that quietly downloads, decrypts, and runs an attacker-controlled payload in memory.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The ClickFix command launches a hidden conhost.exe process that uses built-in Windows tools to fetch a small tar archive, unpack it into AppData, and run a windowless Python interpreter.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The bundled interpreter executes a compiled Python bytecode file that reconstructs and decrypts CastleLoader shellcode entirely in memory.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The shellcode retrieves the final stage using the hardcoded GoogeBot user agent and a staging path consistent with prior CastleLoader operations.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The malware relies on hashed DLL names, hashed API identifiers, and PEB Walking to resolve required APIs at runtime and decrypts the downloaded payload using the first 16 bytes as an XOR key before running it directly in memory.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Blackpoint linked the activity to CastleLoader based on overlapping network markers and loader behavior.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The GoogeBot user agent has appeared repeatedly in 2025 CastleLoader traffic and the /service/download/ path mirrors previous staging infrastructure.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The malware's reliance on hashed DLL names, hashed API identifiers, and PEB Walking aligns with earlier samples, though this variant swaps AutoIt stagers for a Python script.
First reported: 10.12.2025 18:452 sources, 2 articlesShow sources
- ClickFix Social Engineering Sparks Rise of CastleLoader Attacks — www.infosecurity-magazine.com — 10.12.2025 18:45
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
LummaStealer, also known as LummaC2, is an infostealer operation running as a malware-as-a-service (MaaS) platform that was disrupted in May 2025 when multiple tech firms and law enforcement authorities seized 2,300 domains and the central command structure supporting the malicious service.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Infostealing malware targets various sensitive data that can range from credentials and cookies stored in web browsers, cryptocurrency wallet details, and documents to session cookies, authentication tokens, VPN configurations, and account data.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Although the law enforcement operation severely disrupted the LummaStealer activity, the MaaS operation started to resume in July 2025.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
A new report from cybersecurity company Bitdefender warns that LummaStealer operations have scaled significantly between December 2025 and January 2026, now being delivered through a malware loader called CastleLoader, and increasingly relying on ClickFix techniques.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
"At the core of many of these campaigns is CastleLoader, which plays a central role in helping LummaStealer spread through delivery chains. Its modular, in-memory execution model, extensive obfuscation, and flexible command-and-control communication make it well-suited to malware distribution of this scale," Bitdefender researchers say.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
CastleLoader emerged in early 2025 and has been distributing multiple families of infostealers and remote access trojans (Stealc, RedLine, Rhadamanthys, MonsterV2, CastleRAT, SectopRAT, NetSupport RAT, WarmCookie) through various methods, including ClickFix.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The malware loader is a heavily obfuscated script-based (AutoIT or Python) malware loader that decrypts, loads, and executes the LummaStealer payload entirely in memory.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
It employs multiple obfuscation layers, including dictionary-based renaming of variables and functions, encoded strings decoded at runtime, large amounts of junk code and dead branches, and arithmetic and logic operations that resolve to trivial results.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Before executing LummaStealer, CastleLoader performs environment and sandbox checks to determine if it’s being analyzed, and adjusts file paths and persistence locations depending on which security products are detected on the host.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Persistence is achieved by copying the malicious AutoIT script to a persistence path, copying the interpreter to a separate location, and creating an internet shortcut file on Startup that launches the interpreter with the script as an argument.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Bitdefender found that CastleLoader deliberately initiates a failed DNS lookup for a non-existent domain, resulting in a DNS failure. The cybersecurity company says that artifacts from this network behavior can be used to detect CastleLoader activity.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
In a report in November, researchers at Recorded Future's Insikt Group noted that a domain on CastleLoader's infrastructure acted as a command-and-control (C2) server for LummaStealer, indicating an early connection between the two operations.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
Currently, LummaStealer is distributed via multiple channels, including trojanized software installers, pirated software downloaded from fake sites or torrents, and fake media or game archives in campaigns targeting countries all over the world.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
According to the researchers, ClickFix is a "highly effective infection vector in LummaStealer campaigns." Users are served fake CAPTCHA or verification pages with detailed instructions to execute a malicious PowerShell command that had already been added to the clipboard.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
-
The command ultimately retrieves a malicious script from the attacker's server and executes it on the local machine. The payload delivered this way was CastleLoader, which, in some cases, fetched and executed the LummaStealer info-stealing malware.
First reported: 11.02.2026 19:021 source, 1 articleShow sources
- LummaStealer infections surge after CastleLoader malware campaigns — www.bleepingcomputer.com — 11.02.2026 19:02
Similar Happenings
ErrTraffic Service Enables Automated ClickFix Attacks via Fake Browser Glitches
A new cybercrime tool called ErrTraffic automates ClickFix attacks by generating fake browser glitches on compromised websites to trick users into downloading malware or following malicious instructions. The service promises high conversion rates and delivers architecture-specific payloads. ClickFix attacks have gained popularity among cybercriminals and state-sponsored actors for bypassing security controls. ErrTraffic is sold for a one-time purchase of $800 and offers a user-friendly panel for campaign management. It modifies the DOM of compromised websites to display visual glitches, prompting victims to execute malicious commands. Payloads include Lumma and Vidar info-stealers on Windows, Cerberus trojan on Android, AMOS stealer on macOS, and unspecified Linux backdoors.
GootLoader Resurfaces with New Font Obfuscation and ZIP Evasion Tactics
GootLoader, a JavaScript-based malware loader, has resurfaced with advanced tactics to evade detection. The malware now uses custom WOFF2 fonts to obfuscate filenames, modifies ZIP files to appear harmless in analysis tools, and employs concatenated ZIP archives of up to 1,000 parts. Since October 27, 2025, three infections have been observed, two of which led to domain controller compromises within 17 hours. GootLoader, linked to the Hive0127 threat actor, exploits WordPress comment endpoints to deliver XOR-encrypted ZIP payloads. The malware's latest campaign targets users searching for legal templates, redirecting them to compromised WordPress sites hosting malicious ZIP archives. The ZIP files are designed to evade static analysis by displaying harmless text in analysis tools while extracting malicious JavaScript files on Windows. The payload deploys the Supper backdoor, which provides remote control and SOCKS5 proxying capabilities. Threat actors have used this backdoor to move laterally to domain controllers and create admin-level user accounts. The latest findings highlight GootLoader's use of malformed ZIP archives that evade detection by tools like WinRAR or 7-Zip, while still being extractable by the default Windows unarchiver. The malware employs hashbusting techniques, including randomizing values in non-critical fields and concatenating a unique number of files, to evade detection. The ZIP archive is delivered as an XOR-encoded blob, decoded and repeatedly appended to itself on the client-side to evade network-based detection. The JavaScript malware creates a Windows shortcut (LNK) file in the Startup folder to establish persistence and executes a second JavaScript file using cscript.
Increased Use of ClickFix Attacks by Threat Actors
ClickFix attacks, where users are tricked into running malicious commands by copying code from a webpage, have become a significant source of security breaches. These attacks are used by various threat actors, including the Interlock ransomware group and state-sponsored APTs. Recent data breaches at Kettering Health, DaVita, City of St. Paul, and Texas Tech University Health Sciences Centers have been linked to ClickFix-style tactics. The attacks exploit user behavior and technical gaps in detection to evade security measures and compromise systems. They are delivered through SEO poisoning, malvertising, and other non-email vectors, making them harder to detect and prevent. Effective defense against ClickFix attacks requires browser-based detection and blocking to intercept these threats at the earliest opportunity.
TikTok Videos Distribute Infostealers via ClickFix Attacks
Cybercriminals are using TikTok videos to distribute information-stealing malware through ClickFix attacks. The videos, disguised as activation guides for popular software like Windows, Spotify, and Netflix, trick users into executing malicious PowerShell commands. These commands download and execute Aura Stealer malware, which steals credentials, cookies, and cryptocurrency wallets. The campaign has been ongoing and is similar to one observed by Trend Micro in May 2025.
FileFix Attack Evolves with Cache Smuggling Technique
A new variant of the FileFix social engineering attack uses cache smuggling to evade security software. This technique involves hiding a malicious ZIP archive within a browser's cache to bypass detection. The attack impersonates a Fortinet VPN Compliance Checker and tricks users into executing a PowerShell script through the Windows File Explorer address bar. The script extracts the malicious payload from the cache and executes it. This new variant was first observed by cybersecurity researcher P4nd3m1cb0y and detailed by Marcus Hutchins of Expel. The attack has been adopted by various threat actors, including ransomware groups. Additionally, a new ClickFix kit called the IUAM ClickFix Generator has been discovered, which automates the creation of ClickFix-style lures.