FUD #CastleLoader being distributed via malvertizing.
785ba9c42deca8cfc69f1aafb371802782d01bc8156a67c5c0d412c5fb3b4e33
C2: astroflightvision[.]com
The signer, "Soft Insanity Oy" led us to find other FUD malware from November.
1/3
CryptoCharger/CryptoVisa reaches out to 666777228[.]com which has been used by other payloads too.
Notably Signer:"TRUST & SIGN POLAND SP Z O O"
045f583cb7f46ae38ea65fc25d4c7678f306a589ab599dda7d9da404ee91d2f9 which we reported in March 2026.
3/3
In November "Soft Insanity Oy" received a code-signing certificate from Certum and GoGetSSL.
The Certum cert signed CastleLoader, but what about the GoGetSSL?
"CryptoChanger.exe" / "node.exe" a54f626f130c36709857215122d6ceb16e5fab7047316afc31a83dfa620cf292
2/3
FUD #CastleLoader being distributed via malvertizing.
785ba9c42deca8cfc69f1aafb371802782d01bc8156a67c5c0d412c5fb3b4e33
C2: astroflightvision[.]com
The signer, "Soft Insanity Oy" led us to find other FUD malware from November.
1/3
We see so many abused certificates, that we can't dig deep. If ya'll ever want to get in on the front lines of it, be sure to join the Debloat Discord where we monitor and chat about abused certificates.
2/3
We didn't know how an actor was using EV Certificates issued to Lenovo and others.
We now do.
From DigiCert's incident report:
"the threat actor used a compromised analyst endpoint to access DigiCert's internal support portal. The threat actor used a limited function within the customer-support portal which allows authenticated DigiCert support analysts to access customer accounts from the customer's perspective to facilitate support tasks. The threat actor was able to use this function to access initialization codes for orders that were approved but pending delivery for EV Code Signing certificate orders across a finite set of customer accounts."
"Possession of the initialization code, combined with an approved order, is functionally sufficient to generate and retrieve the corresponding certificate."
The full report can be found here and explains the incident in great detail: https://bugzilla.mozilla.org/show_bug.cgi?id=2033170
The report mentions "Where we got lucky: A community member involved in security research reported the evolving pattern of misused certificates and engaged in dialogue with our support team. Without that report, the undetected compromise of ENDPOINT2 and the associated mis-issuance might have remained undiscovered for a longer period."
Special thanks goes to the regular contributors to the Cert Graveyard.
Also special thanks to DigiCert: this report has a high level of transparency, which is warranted, and also well executed.
The lab is openly accessible here: pkilab.certgraveyard.org
I'd love to get your feedback or hear if you have any problems. :)
Certificates are extracted client-side, allowing you to parse certs from 900MB+ size files.
2/2
CertGraveyard's PKI Lab is available now.
Want to better understand code-signing certificates? The site allows you to extract and view certificates.
The Cert Inspection tool parses out all of the bits and flags anomalies.
1/2