TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT.
“Available in both Python and C variants, CastleRAT’s core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell,” Recorded Future Insikt Group

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

Next Post

CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation

Related Posts
Total
0
Share