Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Posted on December 9, 2025December 9, 2025 By CWS

Dec 09, 2025Ravie LakshmananCybersecurity / Malware
4 distinct risk exercise clusters have been noticed leveraging a malware loader often called CastleLoader, strengthening the earlier evaluation that the instrument is obtainable to different risk actors underneath a malware-as-a-service (MaaS) mannequin.
The risk actor behind CastleLoader has been assigned the identify GrayBravo by Recorded Future’s Insikt Group, which was beforehand monitoring it as TAG-150.
GrayBravo is “characterised by speedy improvement cycles, technical sophistication, responsiveness to public reporting, and an expansive, evolving infrastructure,” the Mastercard-owned firm stated in an evaluation printed at this time.

Among the notable instruments within the risk actor’s toolset embody a distant entry trojan referred to as CastleRAT and a malware framework known as CastleBot, which contains three parts: a shellcode stager/downloader, a loader, and a core backdoor.

The CastleBot loader is answerable for injecting the core module, which is supplied to contact its command-and-control (C2) server to retrieve duties that allow it to obtain and execute DLL, EXE, and PE (moveable executable) payloads. Among the malware households distributed by way of this framework are DeerStealer, RedLine Stealer, StealC Stealer, NetSupport RAT, SectopRAT, MonsterV2, WARMCOOKIE, and even different loaders like Hijack Loader.

Recorded Future’s newest evaluation has uncovered 4 clusters of exercise, every working with distinct ways –

Cluster 1 (TAG-160), which targets the logistics sector utilizing phishing and ClickFix methods to distribute CastleLoader (Lively since a minimum of March 2025)
Cluster 2 (TAG-161), which makes use of Reserving.com-themed ClickFix campaigns to distribute CastleLoader and Matanbuchus 3.0 (Lively since a minimum of June 2025)
Cluster 3, which makes use of infrastructure impersonating Reserving.com together with ClickFix and Steam Group pages as a useless drop resolver to ship CastleRAT by way of CastleLoader (Lively since a minimum of March 2025)
Cluster 4, which makes use of malvertising and pretend software program replace lures masquerading as Zabbix and RVTools to distribute CastleLoader and NetSupport RAT (Lively since a minimum of April 2025)

GrayBravo has been discovered to leverage a multi-tiered infrastructure to help its operations. This consists of Tier 1 victim-facing C2 servers related to malware households like CastleLoader, CastleRAT, SectopRAT, and WARMCOOKIE, in addition to a number of VPS servers that probably function as backups.

The assaults mounted by TAG-160 are additionally notable for utilizing fraudulent or compromised accounts created on freight-matching platforms like DAT Freight & Analytics and Loadlink Applied sciences to reinforce the credibility of its phishing campaigns. The exercise, Recorded Future added, illustrates a deep understanding of trade operations, impersonating authentic logistics corporations, exploiting freight-matching platforms, and mirroring genuine communications to reinforce its deception and impression.
It has been assessed with low confidence that the exercise might be associated to a different unattributed cluster that focused transportation and logistics firms in North America final yr to distribute numerous malware households.
“GrayBravo has considerably expanded its person base, evidenced by the rising variety of risk actors and operational clusters leveraging its CastleLoader malware,” Recorded Future stated. “This development highlights how technically superior and adaptive tooling, notably from a risk actor with GrayBravo’s fame, can quickly proliferate inside the cybercriminal ecosystem as soon as confirmed efficient.”

The Hacker News Tags:CastleLoader, Clusters, Expands, GrayBravo, Infrastructure, Malware, Service, Threat

Post navigation

Previous Post: See Cyber Threats to Your Industry and Region in Just 2 Seconds
Next Post: Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities

Related Posts

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 The Hacker News
The Wild West of Shadow IT The Wild West of Shadow IT The Hacker News
Rethinking Security for Scattered Spider Rethinking Security for Scattered Spider The Hacker News
AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns The Hacker News
F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More The Hacker News
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark