Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CastleLoader Malware Infected 469 Device Using Fake Github Repos and Clickfix Phishing
Identity

CastleLoader Malware Infected 469 Device Using Fake Github Repos and Clickfix Phishing

userBy userJuly 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 24, 2025Ravi LakshmananMalware/Cybercrime

Cybersecurity researchers are shedding light on a new, versatile malware loader called Castle Loaders, used in campaigns that distribute a variety of information steelers and remote access trojans (rats).

The activity employs a CloudFlare-themed Clickfix phishing attack and a fake Github repository opened in the name of a legitimate application, Swiss Cybersecurity Company Prodaft said in a report shared with Hacker News.

The first observed malware loaders in Wild earlier this year have been used to distribute other loaders such as Deerstealer, Redline, StealC, NetSupport Rat, Sectoprat, and even Hijack Loader.

Cybersecurity

“We employ dead code injection and packaging technology to prevent analysis,” the company said. “After unpacking at runtime, it connects to a C2 (Command and Control) server, downloads and runs the target module.”

The Castle Loader payload is distributed as a portable executable containing embedded shellcode, and then calls the main module of the loader that connects to the C2 server to fetch and run the next stage malware.

Malware distribution attacks rely on popular Clickfix techniques for domains that disguise software development libraries, video conferencing platforms, browser update notifications, or document verification systems, which ultimately trick users to copy and execute PowerShell commands that activate the infection chain.

Victims are directed to fake domains via Google search. At this point, we will provide a page containing fake error messages and Captcha validation boxes developed by the threat actor and ask you to execute a set of instructions to address the issue.

Alternatively, CastleLoader leverages fake Github repositories to mimic legal tools as distribution vectors, ensuring that users who unconsciously download them compromise their machines with malware instead.

“This approach leverages developers’ trust in GitHub and the trend of running install commands from repositories that appear to be well-reputed,” Prodaft said.

Prodaft said he observed that Hijack Loader was being delivered via Deerstealer and Castleloader, the latter propagating the Deerstealer variations as well. This suggests the overlap between these campaigns, despite the fact that they are organized by a variety of threat actors.

Cybersecurity

Since May 2025, the Castleloader campaign has utilized seven different C2 servers, with over 1,634 infection attempts recorded over the period. An analysis of the C2 infrastructure and web-based panels used to monitor and manage infections shows that as many as 469 devices have been compromised, resulting in a 28.7% infection rate.

“The Castleloader is a new, aggressive threat that is being adopted quickly in a variety of malicious campaigns and is being adopted rapidly to deploy a variety of other loaders and steelers,” Prodaft said. “Its sophisticated anti-analytical techniques and multi-stage infection processes highlight its effectiveness as a major distribution mechanism in the current threat landscape.”

“The C2 panel typically shows operational capabilities associated with the provision of malware As-a-Service (MAAS), suggesting that operators have experience in cybercrime infrastructure development.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSamsung supports video AI startups that can analyze thousands of hours of footage
Next Article Cybercrime Forum Leak Zone has published the IP address of the user
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

July 25, 2025

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

It took Google a month to shut down Catwatchful, a phone spyware operation hosted on the server

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.