Four Threat Clusters Linked to CastleLoader as GrayBravo Expands Malware Operations

Published:

spot_img

Dec 09, 2025Ravie LakshmananCybersecurity / Malware

Overview of CastleLoader Threat Activity

Recent investigations have identified four distinct threat clusters utilizing a malware loader known as CastleLoader. This finding reinforces earlier analyses suggesting that CastleLoader is being offered as a Malware-as-a-Service (MaaS), allowing various cybercriminals to exploit its features for their malicious activities.

Identifying GrayBravo

The group behind CastleLoader has been dubbed GrayBravo by Recorded Future’s Insikt Group, previously recognized as TAG-150. This team has garnered attention due to its rapid development cycles, technical prowess, and a flexible, expanding infrastructure, according to an analysis released by Mastercard’s cybersecurity division.

The Toolset of GrayBravo

GrayBravo’s arsenal includes various sophisticated malware tools, most notably a remote access trojan (RAT) named CastleRAT and a comprehensive framework called CastleBot. CastleBot incorporates three primary elements: a shellcode stager and downloader, a loader, and a core backdoor. This framework forms the backbone of their operations, allowing the threat actor to execute complex attacks.

Functionality of CastleBot

The CastleBot loader plays a critical role in the operation by injecting its core component, which can reach out to its command-and-control (C2) servers. This enables the loader to receive tasks that download and execute various payload types such as DLL, EXE, and PE files. Among the multitude of malware families that CastleBot is known to distribute are DeerStealer, RedLine Stealer, StealC Stealer, and different RATs like NetSupport RAT and SectopRAT, among others.

Analysis of Threat Activity Clusters

Recorded Future’s report highlights the activities of four distinct clusters, each deploying unique tactics:

  • Cluster 1 (TAG-160): Targeting the logistics sector, this cluster utilizes phishing and ClickFix techniques to spread CastleLoader. It has been active since March 2025.
  • Cluster 2 (TAG-161): This group’s campaigns leverage Booking.com-themed ClickFix strategies to distribute both CastleLoader and Matanbuchus 3.0, with operations noted since June 2025.
  • Cluster 3: This faction mimics Booking.com infrastructure and employs ClickFix and Steam Community pages to deliver CastleRAT via CastleLoader, active since March 2025.
  • Cluster 4: Using malvertising tactics and fake software updates claiming to be Zabbix and RVTools, this cluster distributes CastleLoader and NetSupport RAT, beginning its operations in April 2025.

Operational Infrastructure of GrayBravo

GrayBravo has built a multi-tiered operational infrastructure, which includes Tier 1 C2 servers directed at victims and linked with various malware families like CastleLoader, CastleRAT, SectopRAT, and WARMCOOKIE. In addition, multiple Virtual Private Servers (VPS) are likely used as backup systems to ensure the reliability of their operations.

Pillars of GrayBravo’s Strategy

The phishing strategies employed by TAG-160 stand out, particularly in their use of forged or compromised accounts on freight-matching platforms such as DAT Freight & Analytics and Loadlink Technologies. This approach elevates the credibility of their phishing efforts, illustrating an intricate understanding of the logistics industry, and enabling them to effectively impersonate legitimate companies.

While there’s low confidence in direct connections, the activity of GrayBravo may be related to a previously unlinked operation targeting transportation and logistics firms in North America last year, which aimed to deliver various malware types.

The Evolution of GrayBravo’s Reach

GrayBravo’s considerable growth is evident through its expanding user base and the increasing number of threat actors and operational clusters that have started to use the CastleLoader malware. This trend highlights the formidable nature of GrayBravo’s technology, which can quickly disseminate throughout the cybercriminal landscape once its effectiveness is established.

spot_img

Related articles

Recent articles

2025 Global Cybersecurity Report: Ransomware Attacks Surge by 50% to 6,000

The Cybersecurity Landscape of 2025: A Deep Dive into the Escalation of Threats The year 2025 has emerged as a pivotal point in the world...

Unpacking Recent Bitcoin Activity on the Dark Web: What Does It Mean?

Recent Movement of Silk Road Bitcoin Raises Questions In a surprising turn of events, Bitcoin linked to the now-defunct Silk Road marketplace has recently seen...

December 2025 Microsoft Patch Tuesday: One Zero-Day and Six Critical Vulnerabilities Resolved

In its December 2025 Patch Tuesday update, Microsoft addressed a total of 57 vulnerabilities, featuring one actively exploited zero-day and six vulnerabilities classified as...

SandboxAQ Unveils AQtive Guard AI-SPM to Combat the Rise of Shadow AI in Enterprises

SandboxAQ Introduces AI-Driven Security Posture Management Addressing the AI Blind Spot in Cybersecurity SandboxAQ, an innovator in the realm of AI-driven cybersecurity, has launched its AI...