Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

Posted on December 5, 2025December 5, 2025 By CWS

A brand new Distant Entry Trojan often called CastleRAT has emerged as a rising risk to Home windows programs worldwide.

First noticed round March 2025, this malware allows attackers to realize full distant management over compromised machines.

The risk is available in two essential builds: a light-weight Python model and a extra highly effective compiled C model, with the latter providing superior capabilities together with keystroke seize, display grabs, and chronic set up strategies.

CastleRAT communicates with its command-and-control server utilizing RC4 encryption with a hardcoded key.

As soon as deployed, the malware collects system info similar to laptop title, username, machine GUID, public IP deal with, and product particulars, then transmits this knowledge to the attacker.

The contaminated host receives directions and extra instruments from the C2 server, permitting the attacker to execute instructions remotely.

Splunk safety researchers recognized that CastleRAT employs a number of refined strategies mapped to the MITRE ATT&CK framework.

The malware gathers fundamental system particulars and makes use of free net companies like ip-api.com to acquire public IP addresses for normal beaconing.

Clipboard Knowledge Assortment and Exfiltration

One notable approach entails clipboard knowledge harvesting. CastleRAT launches a number of threads inside its course of, with every thread finishing up totally different malicious actions.

The clipboard assortment thread targets customers who typically copy credentials or cryptocurrency addresses, making this an efficient methodology for harvesting delicate info like usernames, passwords, and pockets strings.

CastleRAT beacon and C2 communication move (Supply – Splunk)

The malware hijacks the clipboard and simulates paste actions to exfiltrate knowledge stealthily. Reasonably than opening community sockets or calling apparent community APIs, CastleRAT copies harvested info to the clipboard and invokes SendInput() to stick knowledge into benign-looking purposes.

CastleRAT Clipboard Knowledge Assortment (Supply – Splunk)

This method reduces noisy community artifacts and blends exfiltration into extraordinary consumer exercise, complicating detection efforts.

if (OpenClipboard (0164))
{
EmptyClipboard();
hMem = GlobalAlloc(0x2000u, v2 + 1);
Dest = GlobalLock(hMem);
strcpy(Dest, Supply);
SetClipboardData(1u, hMem);
CloseClipboard();
pInputs[0].ki.wVk = VK_CONTROL;
pInputs[2].ki.wVk = ‘V’;
SendInput(4u, pInputs, 40);
}

Organizations ought to monitor for uncommon outbound connections, one-line PowerShell downloads, surprising binaries in consumer folders, and indicators of RC4-encrypted site visitors to detect this risk.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Attack, CastleRAT, Gain, Hackers, Malware, Remote, Systems, Windows

Post navigation

Previous Post: Russian Hackers Spoof European Events in Targeted Phishing Attacks
Next Post: Cloudflare Outage Caused by React2Shell Mitigations

Related Posts

Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript Cyber Security News
Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address Cyber Security News
New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
Great Firewall of China’s Sensitive Data of Over 500GB+ Leaked Online Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark