Home Cyber Attack CastleLoader Attack Leverages Cloudflare-Themed Clickfix Technique to Target Windows PCs

CastleLoader Attack Leverages Cloudflare-Themed Clickfix Technique to Target Windows PCs

0

A sophisticated new malware threat, dubbed CastleLoader, has emerged as a significant threat targeting Windows systems in 2025.

Since its discovery earlier this year, CastleLoader has facilitated the distribution of various high-impact infostealers and remote access trojans (RATs), including StealC, RedLine, NetSupport RAT, DeerStealer, HijackLoader, and SectopRAT.

The malware’s rapid proliferation is attributed to its use of advanced social engineering tactics and a flexible delivery infrastructure.

Fake GitHub Repositories

CastleLoader’s primary attack vector employs the so-called “Clickfix” technique through Cloudflare-themed phishing sites that masquerade as legitimate resources, such as software development libraries, document verification systems, and browser update pages.

CastleLoader’s attack chain and distribution mechanism.

Victims, lured via malicious Google search results, are presented with fake error messages or CAPTCHA prompts directing them to copy and execute seemingly benign PowerShell commands.

Unbeknownst to users, these commands actually download and run CastleLoader payloads from attacker-controlled domains.

Technical analysis reveals that once executed, the script retrieves a ZIP archive from a distribution domain, extracts its contents, and launches a malicious AutoIT script designed to load malware shellcode and initiate command-and-control (C2) communication.

According to the Catalyst report, the dynamically delivered secondary payloads enable threat actors to tailor campaigns, targeting victims with either data theft or remote access tools based on their operational objectives.

In addition to Clickfix, attackers have adopted a secondary method by creating fraudulent GitHub repositories that imitate popular software such as SQL Server Management Studio.

By modifying binaries and publishing them under the guise of trusted projects, CastleLoader operators exploit the inherent trust developers have in reputed open-source platforms, coercing users into executing malicious code downloaded from these repositories.

Flexible Malware Distribution Platform

CastleLoader’s infrastructure is underpinned by a robust web-based C2 management panel (v1.1 Alpha), which offers granular control over infection metrics, payload delivery, and victim management.

The installs page of the CastleLoader C2 panel.

Features typical of malware-as-a-service (MaaS) platforms such as campaign configuration, automated ZIP extraction, administrative privilege escalation, and geo-fencing are present, although no evidence suggests the malware is commercially available on underground forums.

Unique victim identifiers, machine data, and detailed telemetry allow operators to manage re-infection and payload redeployment efficiently.

Operators also employ a distributed approach for initial and secondary payloads, communicating with multiple domains and occasionally leveraging legitimate file-sharing services to increase resilience against takedowns and complicate forensic investigation.

Over a two-month campaign, seven C2 servers recorded nearly 1,634 download attempts, infecting 469 victims, among them over 400 entities in critical government sectors within the United States.

The infection rate among those who interacted with malicious links was a striking 28.7%, indicating the effectiveness of the attackers’ social engineering techniques.

CastleLoader’s attacks are notable not only for their technical sophistication but for the innovative manipulation of user behavior.

By leveraging clipboard poisoning and guiding users to execute injected PowerShell via visible “verification” processes, attackers effectively bypass conventional threat detection, capitalizing on gaps in user awareness and endpoint security controls.

In summary, CastleLoader represents a formidable evolution in loader malware, combining advanced backend infrastructure with innovative delivery methods and compelling social engineering.

Its utility as a distribution platform for a variety of high-risk malware makes it a key player in the current threat landscape, especially as attackers continue to refine their techniques to outmaneuver both human vigilance and technical defenses.

Security teams are urged to remain vigilant, educate end-users, and monitor for signs of CastleLoader infection across endpoints and cloud-connected repositories.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version