GrayBravo Expands CastleLoader Malware Operations with Distinct Activity Clusters, Impersonates ‘Booking’ and ‘DAT Freight’

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Created using Copilot | Powered by DALL.E 3

Key Takeaways

New research indicates that the threat actor known as GrayBravo (formerly TAG-150) has significantly expanded its operations, with its CastleLoader malware now being deployed across four distinct activity clusters targeting specific industries, including logistics and hospitality. 

Notably, the threat actor impersonates known entities such as Booking.com and DAT Freight.

Logistics and Hospitality Industries Under Fire

Each cluster exhibits unique tactics, techniques, and procedures (TTPs), reinforcing the theory that GrayBravo is operating a scalable Malware-as-a-Service (MaaS) ecosystem, the latest The Recorded Future report said.

Overview of GrayBravo and associated clusters
Overview of GrayBravo and associated clusters | Source: Recorded Future

These clusters are:

One of the most prominent clusters, tracked as TAG-160, focuses heavily on the logistics sector. Attackers in this cluster use sophisticated phishing lures that impersonate legitimate logistics firms and abuse freight-matching platforms such as DAT Freight & Analytics and Loadlink Technologies. 

Multi-tiered infrastructure linked to GrayBravo
Multi-tiered infrastructure linked to GrayBravo | Source: Recorded Future

By spoofing emails and re-registering legitimate domains, they effectively deceive victims into executing the malware. Another cluster, TAG-161, targets a broader audience by impersonating Booking.com. 

Victim communication with multiple CastleRAT C2 servers simultaneously
Victim communication with multiple CastleRAT C2 servers simultaneously | Source: Recorded Future

This group employs "ClickFix" techniques, tricking users into copying and pasting malicious commands, to deliver payloads such as CastleLoader and Matanbuchus, and utilizes novel phishing email management tools to coordinate its attacks.

Evolving Activity Clusters and Mitigation

The discovery of these CastleLoader activity clusters highlights the evolving nature of the threat. Beyond logistics and hospitality, other clusters employ malvertising and fake software updates to distribute payloads. 

The infrastructure supporting these operations is multi-tiered and robust, often leveraging compromised legitimate internet services. Security professionals are advised to:

In other recent news, a new packer-as-a-service called Shanya emerged. It offers sophisticated obfuscation features to cybercriminals and is already used by the Akira, Qilin, and Medusa ransomware groups. 

Fake Booking.com sites distributing AsyncRAT were seen in June, when scammers targeted the brand with generative AI phishing campaigns. A ClickFix attack leveraged email invite lures to send users to spoofed Microsoft Teams login pages in August.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: