Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsNew CastleLoader Variant Linked to 469 Infections Across Critical Sectors
New CastleLoader Variant Linked to 469 Infections Across Critical Sectors
Cybersecurity

New CastleLoader Variant Linked to 469 Infections Across Critical Sectors

•January 15, 2026
0
HackRead
HackRead•Jan 15, 2026

Why It Matters

The infection of hundreds of critical‑sector systems demonstrates the growing effectiveness of fileless loaders, raising operational risk for governments and essential services. Immediate mitigation requires both user awareness and advanced behavioral defenses.

Key Takeaways

  • •CastleLoader variant compromises 469 devices in critical sectors
  • •Uses ClickFix fake updates to trick users
  • •Employs process hollowing and memory‑only execution
  • •Contacts C2 server 94.159.113.32 for payloads
  • •Evades traditional AV; demands behavioral detection

Pulse Analysis

CastleLoader’s emergence marks another milestone in the evolution of fileless malware, a class of threats that live exclusively in RAM and leave no trace on disk. First observed in mid‑2025, the loader has rapidly matured, now accounting for 469 confirmed compromises across U.S. federal agencies and European logistics and travel networks. By leveraging a lightweight Inno Setup package and the AutoIt scripting engine, attackers can slip past conventional signature‑based scanners and establish a foothold with minimal exposure. This shift underscores how adversaries are prioritizing stealth over sheer volume.

The infection chain begins with a deceptive “ClickFix” prompt that mimics a Windows update or missing DLL warning, coaxing users into granting execution rights. Once launched, CastleLoader performs process hollowing, hijacking legitimate binaries such as jsc.exe to mask malicious code inside trusted memory spaces. Its memory‑only payload avoids writing files to disk, rendering many endpoint protection platforms blind to its activity. After establishing persistence, the loader reaches out to the hard‑coded C2 address 94.159.113.32, pulling down credential stealers or full‑featured remote‑access trojans for deeper network infiltration.

Defending against CastleLoader requires a layered approach that blends technology with human vigilance. Organizations should deploy behavioral analytics and memory‑monitoring tools capable of spotting anomalous process injection and outbound C2 traffic, while also enforcing strict least‑privilege policies for installer execution. Regular security awareness training can reduce the success rate of ClickFix lures, turning the user from an entry point into a line of defense. As fileless loaders become more prevalent, the cybersecurity market is likely to see accelerated adoption of endpoint detection and response (EDR) platforms that specialize in in‑memory threat hunting.

New CastleLoader Variant Linked to 469 Infections Across Critical Sectors

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...