Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

December 12, 2025

NCSC Plugs Gap in Cyber Deception Guidance

December 12, 2025

Turning Disruptive Technology into a Strategic Advantage

December 12, 2025
Facebook X (Twitter) Instagram
Friday, December 12
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ClickFix Social Engineering Sparks Rise of CastleLoader Attacks
News

ClickFix Social Engineering Sparks Rise of CastleLoader Attacks

Team-CWDBy Team-CWDDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new malware campaign using a Python-based delivery chain to deploy the emerging CastleLoader family has been discovered by cybersecurity researchers.

According to Blackpoint, the activity revolves around the use of ClickFix social engineering prompts that convince users to open the Windows Run dialog and execute a command that appears to be part of a harmless verification step.

That single action initiates a multi-stage sequence that quietly downloads, decrypts and runs an attacker-controlled payload in memory.

What’s new in this new campaign is the replacement of earlier AutoIt droppers with a compact Python loader. According to the researchers, the ClickFix command launches a hidden conhost.exe process that uses built-in Windows tools to fetch a small tar archive, unpack it into AppData and run a windowless Python interpreter.

The bundled interpreter executes a compiled Python bytecode file that reconstructs and decrypts CastleLoader shellcode entirely in memory. Long used by this malware family, this technique avoids placing a traditional executable on disk.

The shellcode that follows retrieves the final stage using the hardcoded GoogeBot user agent and a staging path consistent with prior CastleLoader operations.

It then applies PEB Walking – a technique that scans the Process Environment Block (PEB) to locate loaded modules and resolve function addresses without using normal imports – to resolve required APIs at runtime and decrypts the downloaded payload using the first 16 bytes as an XOR key before running it directly in memory.

Read more on ClickFix-based campaigns: ‘ClickFix’ Phishing Scam Impersonates Booking.com to Target Hospitality 

Blackpoint linked the activity to CastleLoader based on overlapping network markers and loader behavior.

The GoogeBot user agent has appeared repeatedly in 2025 CastleLoader traffic and the /service/download/ path mirrors previous staging infrastructure.

The malware’s reliance on hashed DLL names, hashed API identifiers and PEB Walking also aligns with earlier samples (though this variant swaps AutoIt stagers for a Python script).

Blackpoint highlighted several steps organizations can take to limit exposure:

  • Educate users about ClickFix lures that instruct them to run verification commands

  • Restrict access to the Run dialog for users who do not require it

  • Limit cmd.exe, PowerShell and Python access where operationally unnecessary

  • Monitor for unusual LOLBin sequences involving conhost.exe, cmd.exe or pythonw.exe

  • Track DNS activity for suspicious or newly registered domains

  • Watch for Python binaries executed from atypical locations, such as AppData

The company concluded that although the final payload was unavailable for analysis, every observed stage aligned with CastleLoader’s established methods.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
Next Article Iran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
Team-CWD
  • Website

Related Posts

News

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

December 12, 2025
News

NCSC Plugs Gap in Cyber Deception Guidance

December 12, 2025
News

Turning Disruptive Technology into a Strategic Advantage

December 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

How chatbots can help spread scams

October 14, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.