Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ClickFix Social Engineering Sparks Rise of CastleLoader Attacks
News

ClickFix Social Engineering Sparks Rise of CastleLoader Attacks

Team-CWDBy Team-CWDDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new malware campaign using a Python-based delivery chain to deploy the emerging CastleLoader family has been discovered by cybersecurity researchers.

According to Blackpoint, the activity revolves around the use of ClickFix social engineering prompts that convince users to open the Windows Run dialog and execute a command that appears to be part of a harmless verification step.

That single action initiates a multi-stage sequence that quietly downloads, decrypts and runs an attacker-controlled payload in memory.

What’s new in this new campaign is the replacement of earlier AutoIt droppers with a compact Python loader. According to the researchers, the ClickFix command launches a hidden conhost.exe process that uses built-in Windows tools to fetch a small tar archive, unpack it into AppData and run a windowless Python interpreter.

The bundled interpreter executes a compiled Python bytecode file that reconstructs and decrypts CastleLoader shellcode entirely in memory. Long used by this malware family, this technique avoids placing a traditional executable on disk.

The shellcode that follows retrieves the final stage using the hardcoded GoogeBot user agent and a staging path consistent with prior CastleLoader operations.

It then applies PEB Walking – a technique that scans the Process Environment Block (PEB) to locate loaded modules and resolve function addresses without using normal imports – to resolve required APIs at runtime and decrypts the downloaded payload using the first 16 bytes as an XOR key before running it directly in memory.

Read more on ClickFix-based campaigns: ‘ClickFix’ Phishing Scam Impersonates Booking.com to Target Hospitality 

Blackpoint linked the activity to CastleLoader based on overlapping network markers and loader behavior.

The GoogeBot user agent has appeared repeatedly in 2025 CastleLoader traffic and the /service/download/ path mirrors previous staging infrastructure.

The malware’s reliance on hashed DLL names, hashed API identifiers and PEB Walking also aligns with earlier samples (though this variant swaps AutoIt stagers for a Python script).

Blackpoint highlighted several steps organizations can take to limit exposure:

  • Educate users about ClickFix lures that instruct them to run verification commands

  • Restrict access to the Run dialog for users who do not require it

  • Limit cmd.exe, PowerShell and Python access where operationally unnecessary

  • Monitor for unusual LOLBin sequences involving conhost.exe, cmd.exe or pythonw.exe

  • Track DNS activity for suspicious or newly registered domains

  • Watch for Python binaries executed from atypical locations, such as AppData

The company concluded that although the final payload was unavailable for analysis, every observed stage aligned with CastleLoader’s established methods.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
Next Article Iran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

Why you should never pay to get paid

September 15, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.