Key Takeaways
New research indicates that the threat actor known as GrayBravo (formerly TAG-150) has significantly expanded its operations, with its CastleLoader malware now being deployed across four distinct activity clusters targeting specific industries, including logistics and hospitality.
Notably, the threat actor impersonates known entities such as Booking.com and DAT Freight.
Each cluster exhibits unique tactics, techniques, and procedures (TTPs), reinforcing the theory that GrayBravo is operating a scalable Malware-as-a-Service (MaaS) ecosystem, the latest The Recorded Future report said.
These clusters are:
One of the most prominent clusters, tracked as TAG-160, focuses heavily on the logistics sector. Attackers in this cluster use sophisticated phishing lures that impersonate legitimate logistics firms and abuse freight-matching platforms such as DAT Freight & Analytics and Loadlink Technologies.
By spoofing emails and re-registering legitimate domains, they effectively deceive victims into executing the malware. Another cluster, TAG-161, targets a broader audience by impersonating Booking.com.
This group employs "ClickFix" techniques, tricking users into copying and pasting malicious commands, to deliver payloads such as CastleLoader and Matanbuchus, and utilizes novel phishing email management tools to coordinate its attacks.
The discovery of these CastleLoader activity clusters highlights the evolving nature of the threat. Beyond logistics and hospitality, other clusters employ malvertising and fake software updates to distribute payloads.
The infrastructure supporting these operations is multi-tiered and robust, often leveraging compromised legitimate internet services. Security professionals are advised to:
In other recent news, a new packer-as-a-service called Shanya emerged. It offers sophisticated obfuscation features to cybercriminals and is already used by the Akira, Qilin, and Medusa ransomware groups.
Fake Booking.com sites distributing AsyncRAT were seen in June, when scammers targeted the brand with generative AI phishing campaigns. A ClickFix attack leveraged email invite lures to send users to spoofed Microsoft Teams login pages in August.