Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

Posted on December 5, 2025December 5, 2025 By CWS

A brand new Distant Entry Trojan often called CastleRAT has emerged as a rising risk to Home windows programs worldwide.

First noticed round March 2025, this malware allows attackers to realize full distant management over compromised machines.

The risk is available in two essential builds: a light-weight Python model and a extra highly effective compiled C model, with the latter providing superior capabilities together with keystroke seize, display grabs, and chronic set up strategies.

CastleRAT communicates with its command-and-control server utilizing RC4 encryption with a hardcoded key.

As soon as deployed, the malware collects system info similar to laptop title, username, machine GUID, public IP deal with, and product particulars, then transmits this knowledge to the attacker.

The contaminated host receives directions and extra instruments from the C2 server, permitting the attacker to execute instructions remotely.

Splunk safety researchers recognized that CastleRAT employs a number of refined strategies mapped to the MITRE ATT&CK framework.

The malware gathers fundamental system particulars and makes use of free net companies like ip-api.com to acquire public IP addresses for normal beaconing.

Clipboard Knowledge Assortment and Exfiltration

One notable approach entails clipboard knowledge harvesting. CastleRAT launches a number of threads inside its course of, with every thread finishing up totally different malicious actions.

The clipboard assortment thread targets customers who typically copy credentials or cryptocurrency addresses, making this an efficient methodology for harvesting delicate info like usernames, passwords, and pockets strings.

CastleRAT beacon and C2 communication move (Supply – Splunk)

The malware hijacks the clipboard and simulates paste actions to exfiltrate knowledge stealthily. Reasonably than opening community sockets or calling apparent community APIs, CastleRAT copies harvested info to the clipboard and invokes SendInput() to stick knowledge into benign-looking purposes.

CastleRAT Clipboard Knowledge Assortment (Supply – Splunk)

This method reduces noisy community artifacts and blends exfiltration into extraordinary consumer exercise, complicating detection efforts.

if (OpenClipboard (0164))
{
EmptyClipboard();
hMem = GlobalAlloc(0x2000u, v2 + 1);
Dest = GlobalLock(hMem);
strcpy(Dest, Supply);
SetClipboardData(1u, hMem);
CloseClipboard();
pInputs[0].ki.wVk = VK_CONTROL;
pInputs[2].ki.wVk = ‘V’;
SendInput(4u, pInputs, 40);
}

Organizations ought to monitor for uncommon outbound connections, one-line PowerShell downloads, surprising binaries in consumer folders, and indicators of RC4-encrypted site visitors to detect this risk.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Attack, CastleRAT, Gain, Hackers, Malware, Remote, Systems, Windows

Post navigation

Previous Post: Russian Hackers Spoof European Events in Targeted Phishing Attacks
Next Post: Cloudflare Outage Caused by React2Shell Mitigations

Related Posts

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News
Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads Cyber Security News
Adobe’s August 2025 Patch Tuesday Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark