Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

Posted on December 5, 2025December 5, 2025 By CWS

A brand new Distant Entry Trojan often called CastleRAT has emerged as a rising risk to Home windows programs worldwide.

First noticed round March 2025, this malware allows attackers to realize full distant management over compromised machines.

The risk is available in two essential builds: a light-weight Python model and a extra highly effective compiled C model, with the latter providing superior capabilities together with keystroke seize, display grabs, and chronic set up strategies.

CastleRAT communicates with its command-and-control server utilizing RC4 encryption with a hardcoded key.

As soon as deployed, the malware collects system info similar to laptop title, username, machine GUID, public IP deal with, and product particulars, then transmits this knowledge to the attacker.

The contaminated host receives directions and extra instruments from the C2 server, permitting the attacker to execute instructions remotely.

Splunk safety researchers recognized that CastleRAT employs a number of refined strategies mapped to the MITRE ATT&CK framework.

The malware gathers fundamental system particulars and makes use of free net companies like ip-api.com to acquire public IP addresses for normal beaconing.

Clipboard Knowledge Assortment and Exfiltration

One notable approach entails clipboard knowledge harvesting. CastleRAT launches a number of threads inside its course of, with every thread finishing up totally different malicious actions.

The clipboard assortment thread targets customers who typically copy credentials or cryptocurrency addresses, making this an efficient methodology for harvesting delicate info like usernames, passwords, and pockets strings.

CastleRAT beacon and C2 communication move (Supply – Splunk)

The malware hijacks the clipboard and simulates paste actions to exfiltrate knowledge stealthily. Reasonably than opening community sockets or calling apparent community APIs, CastleRAT copies harvested info to the clipboard and invokes SendInput() to stick knowledge into benign-looking purposes.

CastleRAT Clipboard Knowledge Assortment (Supply – Splunk)

This method reduces noisy community artifacts and blends exfiltration into extraordinary consumer exercise, complicating detection efforts.

if (OpenClipboard (0164))
{
EmptyClipboard();
hMem = GlobalAlloc(0x2000u, v2 + 1);
Dest = GlobalLock(hMem);
strcpy(Dest, Supply);
SetClipboardData(1u, hMem);
CloseClipboard();
pInputs[0].ki.wVk = VK_CONTROL;
pInputs[2].ki.wVk = ‘V’;
SendInput(4u, pInputs, 40);
}

Organizations ought to monitor for uncommon outbound connections, one-line PowerShell downloads, surprising binaries in consumer folders, and indicators of RC4-encrypted site visitors to detect this risk.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Attack, CastleRAT, Gain, Hackers, Malware, Remote, Systems, Windows

Post navigation

Previous Post: Russian Hackers Spoof European Events in Targeted Phishing Attacks
Next Post: Cloudflare Outage Caused by React2Shell Mitigations

Related Posts

New ARTEMIS AI Agent Outperformed 9 out of 10 Human Penetration Testers in Detecting Vulnerabilities Cyber Security News
Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Cyber Security News
New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages Cyber Security News
OnePlus OxygenOS Vulnerability Allows Any App to Read SMS Data Without Permission Cyber Security News
Microsoft SQL Server Vulnerability Let Attackers Escalate Privileges Cyber Security News
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Why Identity Security Must Move Beyond MFA
  • Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
  • How Smart MSSPs Using AI to Boost Margins with Half the Staff
  • Anthropic MCP Server Flaws Lead to Code Execution, Data Exposure
  • Oracle’s First 2026 CPU Delivers 337 New Security Patches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Why Identity Security Must Move Beyond MFA
  • Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
  • How Smart MSSPs Using AI to Boost Margins with Half the Staff
  • Anthropic MCP Server Flaws Lead to Code Execution, Data Exposure
  • Oracle’s First 2026 CPU Delivers 337 New Security Patches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark