DNS-based staging via ClickFix represents tactical evolution.

Per Microsoft:
• Cmd.exe → nslookup execution
• Hardcoded external DNS resolver
• Payload embedded in DNS Name: response
• ZIP retrieval from azwsappdev[.]com
• Python-based reconnaissance
• VBScript persistence via Startup LNK
• ModeloRAT deployment
• Lumma Stealer distribution via CastleLoader (GrayBravo)

Campaign telemetry also discussed by Bitdefender and Kaspersky.

DNS offers:
• Reduced dependency on HTTP
• Traffic blending with legitimate queries
• Lightweight validation signaling

Detection priorities:
• Anomalous nslookup patterns
• External DNS resolver usage
• Suspicious Startup LNK creation
• DNS response content inspection

Is your EDR correlating DNS queries with process lineage?
Engage below.
Follow @technadu for advanced threat analysis.

#ThreatIntel #ClickFix #DNSStaging #ModeloRAT #LummaStealer #CastleLoader #DetectionEngineering #BlueTeam #SOC #Infosec #CyberOperations #MalwareAnalysis

LummaStealer Is Getting a Second Life Alongside CastleLoader

Bitdefender researchers have discovered a surge in LummaStealer activity, showing how one of the world's most prolific information-stealing malware operations managed to survive despite being almost brought down by law enforcement less than a year ago.

Bitdefender Labs
Once-hobbled Lumma Stealer is back with lures that are hard to resist

ClickFix bait, combined with advanced Castleloader malware, is installing Lumma "at scale."

Ars Technica
Once-hobbled Lumma Stealer is back with lures that are hard to resist https://arstechni.ca/9U5H #castleloader #infostealer #Security #clickfix #malware #Biz&IT #lumma

👾 #CastleLoader thrives on silence: obfuscation, staged payloads, rotating infrastructure.

⚠️ 28.7% infection rate using #ClickFix + fake GitHub repos. Targets logistics, government, and developers.

See how SOCs can fight back: https://any.run/malware-trends/castleloader/?utm_source=mastodon&utm_medium=post&utm_campaign=castleloader_mtt&utm_term=020226&utm_content=linktomtt

📢⚠️ A new CastleLoader variant linked to at least 469 infections, hitting US government agencies and critical sectors across Europe.

Read: https://hackread.com/castleloader-variant-infections-critical-sectors/

#CyberSecurity #Malware #CastleLoader #USGov #Europe

New CastleLoader Variant Linked to 469 Infections Across Critical Sectors

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

🚨 #CastleLoader attacks government agencies, compromising up to 400+ devices at once.

Its unusual process hollowing via an AutoIt3 script is hard for EDR to detect.

See full analysis with extracted runtime config, C2s, and #IOCs 👇
https://any.run/cybersecurity-blog/castleloader-malware-analysis/?utm_source=mastodon&utm_medium=post&utm_campaign=castleloader_malware_analysis&utm_term=130126&utm_content=linktoblog

#cybersecurity #infosec

CastleLoader Malware Analysis: Full Execution Breakdown 

Read full-cycle technical analysis of CastleLoader malware, covering its entire multi-stage execution by ANY.RUN.

ANY.RUN's Cybersecurity Blog
📢 GrayBravo: quatre clusters CastleLoader ciblent plusieurs secteurs avec phishing ClickFix et C2 redondants
📝 Selon Insikt Group (Recorded Future), avec une...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-10-graybravo-quatre-clusters-castleloader-ciblent-plusieurs-secteurs-avec-phishing-clickfix-et-c2-redondants/
🌐 source : https://www.recordedfuture.com/research/graybravos-castleloader-activity-clusters-target-multiple-industries
#CastleLoader #ClickFix #Cyberveille
GrayBravo: quatre clusters CastleLoader ciblent plusieurs secteurs avec phishing ClickFix et C2 redondants

Selon Insikt Group (Recorded Future), avec une date de coupure d’analyse au 10 novembre 2025, l’acteur de menace GrayBravo (ex-TAG-150) opère un écosystème malware-as-a-service (MaaS) autour de ses familles CastleLoader et CastleRAT, avec une infrastructure multi-niveaux et des campagnes rapidement adaptatives. Le rapport met en évidence quatre clusters distincts exploitant CastleLoader. Deux clusters (dont TAG-160) usurpent des entreprises de logistique et Booking.com, combinant hameçonnage et technique ClickFix pour distribuer CastleLoader et d’autres charges (ex. Matanbuchus). Un autre cluster s’appuie sur malvertising et fausses mises à jour logicielles. L’analyse relie également un alias de forum (« Sparja ») à des activités plausiblement associées à GrayBravo.

CyberVeille

CastleLoader malware, known for Clickfix related attack, has been upgraded with a stealthy Python loader that helps it slip past security defenses.

Read: https://hackread.com/castleloader-malware-python-loader-bypass-security/

#CyberSecurity #Malware #InfoSec #CastleLoader #ClickFix

CastleLoader Malware Now Uses Python Loader to Bypass Security

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread