CastleLoader Malware Strikes 469 Devices via Fake GitHub Repos and ClickFix Phishing Scams

Published:

spot_img

Jul 24, 2025Ravie LakshmananMalware / Cybercrime

Introduction to CastleLoader: A New Cyber Threat

Recent research in cybersecurity has uncovered a sophisticated malware loader known as CastleLoader. This new threat is being actively utilized in campaigns aimed at distributing various types of malware, including information stealers and remote access trojans (RATs). The findings, shared by Swiss cybersecurity firm PRODAFT with The Hacker News, outline the alarming capabilities and tactics employed by CastleLoader.

Phishing Techniques and Distribution Methods

CastleLoader attacks often employ Cloudflare-themed ClickFix phishing schemes. This approach includes the use of counterfeit GitHub repositories that masquerade as reputable applications. Such tactics aim to trick potential victims into downloading malicious software. The malware was first noted earlier this year and has since been linked to several known malicious tools, including DeerStealer, RedLine, and various remote access trojans.

PRODAFT highlights that the loader adeptly utilizes dead code injection and packing techniques to obscure its true nature, making it challenging for cybersecurity experts to analyze. Once activated, CastleLoader connects to a command-and-control (C2) server to download additional malicious modules and execute them accordingly.

A Modular and Versatile Structure

One of the striking features of CastleLoader is its modular architecture. This design allows it to serve dual roles: as both a delivery mechanism for malware and a staging utility. By separating the initial infection from the deployment of payloads, CastleLoader complicates efforts to trace back the source of the attack. This decoupling gives attackers more flexibility in modifying their strategies over time.

CastleLoader’s payloads are packaged as portable executables equipped with embedded shellcode. When executed, they invoke the main module, which in turn connects to its C2 server to retrieve and run the next stage of malware.

Sophisticated Social Engineering Tactics

CastleLoader employs advanced social engineering tactics to lure victims. Users may be directed to fraudulent domains through deceptive Google search results. Once on these pages, the design employs fake error messages and CAPTCHA verification prompts to manipulate users into executing malicious PowerShell commands. This process effectively initiates the infection chain.

Additionally, the malware leverages fraudulent GitHub repositories that impersonate legitimate development tools. The strategy exploits developers’ reliance on GitHub, leading them to inadvertently execute installation commands that introduce malware onto their systems.

Overlapping Threat Campaigns

The interconnected nature of these campaigns is evidenced by instances of Hijack Loader being delivered through both DeerStealer and CastleLoader. This overlap suggests that although distinct threat actors are behind these operations, they share resources and methodologies, increasing the reach and impact of their attacks.

Infection Rates and Malware Infrastructure

Since May 2025, research has documented CastleLoader campaigns utilizing seven different C2 servers, with approximately 1,634 attempted infections recorded in this time frame. Investigations into the C2 infrastructure and its web-based management panels show that nearly 469 devices were compromised, yielding an infection rate of about 28.7%.

Moreover, elements typically associated with advanced loaders, such as anti-sandboxing and obfuscation, have been identified in CastleLoader’s design. These features are common in more sophisticated malware like SmokeLoader or IceID. By employing techniques such as PowerShell abuse and dynamic unpacking, CastleLoader embodies the growing trend of stealth-oriented malware loaders functioning as stagers in the malware-as-a-service (MaaS) ecosystem.

Conclusion: An Evolving Cyber Threat

CastleLoader represents a significant evolution in cyber threats, rapidly adopted by various malicious campaigns for the deployment of additional loaders and data stealers. Its sophisticated methods and multi-stage infection process underscore its effectiveness as a primary distribution tool amid a complex digital landscape. Investigations into its operations reveal a level of expertise typically seen in organized cybercriminal infrastructures, raising concerns about its potential impact and the persistence of such threats in the future.

spot_img

Related articles

Recent articles

Exposed Server Unveils AI-Driven Credential Harvesting Operation with 13,000 Files

Exposed Server Unveils AI-Driven Credential Harvesting Operation with 13,000 Files An exposed server on the internet has provided forensic investigators with a rare glimpse into...

₹3.5 Lakh Bribery Demand Linked to ₹4.5 Crore Public Works Bill Sparks Lokayukta Intervention

₹3.5 Lakh Bribery Demand Linked to ₹4.5 Crore Public Works Bill Sparks Lokayukta Intervention On a recent Monday evening, a social media post by the...

Government Sector Remains Top Cybercrime Target, Accounting for 19% of High-Severity Incidents in 2025

Government Sector Remains Top Cybercrime Target, Accounting for 19% of High-Severity Incidents in 2025 In a revealing analysis of the cybersecurity landscape, Kaspersky Security Services'...

Tata Steel Partners with Google Cloud to Accelerate Global AI Deployment Across Value Chain

Tata Steel Partners with Google Cloud to Accelerate Global AI Deployment Across Value Chain In a significant move for the industrial sector, Tata Steel has...