#castleloader

2026-02-16

DNS-based staging via ClickFix represents tactical evolution.

Per Microsoft:
• Cmd.exe → nslookup execution
• Hardcoded external DNS resolver
• Payload embedded in DNS Name: response
• ZIP retrieval from azwsappdev[.]com
• Python-based reconnaissance
• VBScript persistence via Startup LNK
• ModeloRAT deployment
• Lumma Stealer distribution via CastleLoader (GrayBravo)

Campaign telemetry also discussed by Bitdefender and Kaspersky.

DNS offers:
• Reduced dependency on HTTP
• Traffic blending with legitimate queries
• Lightweight validation signaling

Detection priorities:
• Anomalous nslookup patterns
• External DNS resolver usage
• Suspicious Startup LNK creation
• DNS response content inspection

Is your EDR correlating DNS queries with process lineage?
Engage below.
Follow @technadu for advanced threat analysis.

#ThreatIntel #ClickFix #DNSStaging #ModeloRAT #LummaStealer #CastleLoader #DetectionEngineering #BlueTeam #SOC #Infosec #CyberOperations #MalwareAnalysis

Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Ars Technica Newsarstechnica@c.im
2026-02-11

Once-hobbled Lumma Stealer is back with lures that are hard to resist arstechni.ca/9U5H #castleloader #infostealer #Security #clickfix #malware #Biz&IT #lumma

👾 #CastleLoader thrives on silence: obfuscation, staged payloads, rotating infrastructure.

⚠️ 28.7% infection rate using #ClickFix + fake GitHub repos. Targets logistics, government, and developers.

See how SOCs can fight back: any.run/malware-trends/castlel

2026-01-15

📢⚠️ A new CastleLoader variant linked to at least 469 infections, hitting US government agencies and critical sectors across Europe.

Read: hackread.com/castleloader-vari

#CyberSecurity #Malware #CastleLoader #USGov #Europe

🚨 #CastleLoader attacks government agencies, compromising up to 400+ devices at once.

Its unusual process hollowing via an AutoIt3 script is hard for EDR to detect.

See full analysis with extracted runtime config, C2s, and #IOCs 👇
any.run/cybersecurity-blog/cas

#cybersecurity #infosec

2025-12-11

📢 GrayBravo: quatre clusters CastleLoader ciblent plusieurs secteurs avec phishing ClickFix et C2 redondants
📝 Selon Insikt Group (Recorded Future), avec une...
📖 cyberveille : cyberveille.ch/posts/2025-12-1
🌐 source : recordedfuture.com/research/gr
#CastleLoader #ClickFix #Cyberveille

2025-12-11

CastleLoader malware, known for Clickfix related attack, has been upgraded with a stealthy Python loader that helps it slip past security defenses.

Read: hackread.com/castleloader-malw

#CyberSecurity #Malware #InfoSec #CastleLoader #ClickFix

2025-12-09

GrayBravo expands its CastleLoader campaigns across four activity clusters, impersonating Booking.com & DAT Freight, using ClickFix phishing, malicious MSI installers, and layered MaaS infrastructure.

Full analysis:
technadu.com/graybravo-expands

#GrayBravo #CastleLoader #ThreatIntel #Malware #CyberSecurity #MaaS #Phishing

GrayBravo Expands CastleLoader Malware Operations with Distinct Activity Clusters, Impersonates ‘Booking’ and ‘DAT Freight’
2025-11-20

Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

Aliases for Stealc: win.stealc
Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
Aliases for CASTLELOADER: win.castleloader
Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

#Stealc #CASTLELOADER #NightshadeC2

Aliases provided by Malpedia.

2025-11-20

Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

Aliases for Stealc: win.stealc
Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
Aliases for CASTLELOADER: win.castleloader
Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

#Stealc #CASTLELOADER #NightshadeC2

Aliases provided by Malpedia.

2025-11-20

Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

Aliases for Stealc: win.stealc
Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
Aliases for CASTLELOADER: win.castleloader
Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

#Stealc #CASTLELOADER #NightshadeC2

Aliases provided by Malpedia.

2025-11-20

Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

Aliases for Stealc: win.stealc
Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
Aliases for CASTLELOADER: win.castleloader
Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

#Stealc #CASTLELOADER #NightshadeC2

Aliases provided by Malpedia.

𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲netresec@infosec.exchange
2025-11-20

Here's the full infection chain:

  • 198.211.110.107:79 finger connects to finger[.]cloudyape[.]com
  • 172.67.190.68:80 curl tries cloudyape[.]com/uvey.php?holt=2 but server responds with '301 Moved Permanently' and redirects to HTTPS
  • 172.67.190.68:443 dropper download
  • 172.67.190.68:80 curl gets cloudyape[.]com/uvey.php?holt=1 server redirects to HTTPS
  • 172.67.190.68:443 dropper download
  • 170.130.165.201:80 Download of file4.bin (#StealC) with fake GoogeBot user agent
  • 170.130.165.201:80 #StealC v2 C2 / exfiltration
  • 170.130.55.38:80 #CastleLoader traffic
  • 194.76.227.242:9999 #CastleRAT C2 traffic
Malware infection flows in CapLoader
PCAP from https://tria.ge/251028-3g9yps1ncr/behavioral1
2025-08-10

📢 CastleLoader : un loader modulaire cible des entités gouvernementales US via ClickFix et faux dépôts GitHub
📝 Selon PolySwarm (référence : blog.polyswarm.io), CastleLoader est un loader de malware sophistiqué apparu début 2025 qui...
📖 cyberveille : cyberveille.ch/posts/2025-08-1
🌐 source : blog.polyswarm.io/castleloader
#C2 #CastleLoader #Cyberveille

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst