CastleLoader, a classy malware loader that emerged in early 2025, has efficiently compromised 469 units out of 1,634 an infection makes an attempt since Could 2025, reaching an alarming 28.7% an infection price.
This versatile menace has primarily focused U.S. authorities entities by superior phishing campaigns that exploit consumer belief in reliable platforms and companies.
The malware employs two main an infection vectors to deceive victims into executing malicious code.
The primary technique makes use of ClickFix phishing strategies themed round Cloudflare companies, the place attackers create fraudulent domains that mimic trusted platforms resembling software program growth libraries, Google Meet, or browser replace notifications.
These misleading pages show fabricated error messages or CAPTCHA prompts, manipulating customers into copying and executing malicious PowerShell instructions by the Home windows Run immediate.
PolySwarm analysts recognized CastleLoader’s secondary an infection technique, which leverages faux GitHub repositories disguised as reliable software program instruments.
One notable instance features a repository masquerading as SQL Server Administration Studio (SSMS-lib), exploiting builders’ inherent belief within the GitHub platform to distribute malicious installers that set up connections to command-and-control servers.
The malware demonstrates outstanding versatility in its payload supply capabilities, deploying varied secondary threats together with StealC, RedLine, DeerStealer, NetSupport RAT, SectopRAT, and HijackLoader.
These payloads serve totally different malicious functions, from credential harvesting and cryptocurrency pockets theft to establishing persistent backdoor entry for continued system management.
Technical Structure and C2 Infrastructure
CastleLoader’s technical sophistication turns into evident by its multi-stage execution course of using PowerShell and AutoIT scripts.
Following preliminary compromise, the AutoIT element masses shellcode instantly into system reminiscence as a Dynamic Hyperlink Library (DLL), subsequently resolving hashed DLL names and API calls to determine communication with one among seven distinct command-and-control servers.
The malware operators handle their infrastructure by a complete web-based management panel that gives detailed sufferer telemetry, together with distinctive identifiers, IP addresses, and complete system info.
This panel options specialised modules for payload administration and exact distribution management, supporting geographic focusing on capabilities and encrypted Docker containers to reinforce operational safety and evade detection mechanisms.
Equip your SOC with full entry to the most recent menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial