A newly emerged, highly sophisticated cyber threat actor, TAG-150, is making waves with its advanced cyber tools and methods. Since March 2025, the group has employed a unique and intricate infrastructure to orchestrate attacks on organizations and individuals worldwide. Central to TAG-150's operations is a suite of custom malware, with
A Four-Tiered Technical Approach
Recent research by Insikt Group delves into the complexities of TAG-150's infrastructure, which unfolds over four distinct layers. The structure extends from victim-facing command-and-control (C2) servers to intermediary and backup layers that obfuscate the group's malicious activities. These servers orchestrate the deployment of various malware families, such as CastleBot and CastleRAT, the latter of which comes in both Python and C variants.
CastleRAT is particularly notable for its stealth and effectiveness. The Python variant remains almost undetectable by conventional antivirus solutions, able to stealthily collect system data, manage payloads, execute commands, and self-delete. Meanwhile, the C variant offers an even richer feature set with capabilities for keylogging, clipboard hijacking, screencapturing, file transfers, persistence, and sophisticated detection evasion techniques. This makes it a formidable tool for remote control and surveillance.
Deceptive Tactics and Advanced Infrastructure
TAG-150's initial attacks frequently involve phishing exploits, employing fraudulent domains resembling trusted services or development libraries, and malicious scripts from GitHub repositories. These lures trick victims into running codes disguised as debugging tasks or software updates, boasting an infection rate of 28.7% among users interacting with them. Once a system is compromised, TAG-150 swiftly deploys further malware, connecting affected devices to their C2 network.
In efforts to evade detection and hinder law enforcement or mitigation efforts, TAG-150 employs privacy-focused technology such as Lokinet, Mega.nz, and Kleenscan. The group innovates continuously, even using Steam Community pages for C2 'dead drops,' and encapsulating command protocols within WebSockets. Their infrastructure is agile, often relocated between virtual private servers and residential IP ranges, presenting significant challenges in attribution and response.
Recommendations and Future Concerns
To counteract TAG-150’s activities, experts recommend several strategies. Blocking recognized TAG-150 infrastructure and employing updated Sigma, YARA, and Snort detection rules are essential. Filtering suspicious traffic and monitoring potential data breaches are also critical in combating this emerging threat.
The Insikt Group predicts that TAG-150 will persist in innovating and expanding its cyber arsenal, adopting new malware families and privacy-enhancing technologies to prolong its operations. Their continued activity poses a significant threat to organizations around the globe, underscoring the need for vigilant cybersecurity practices and enhanced threat detection capabilities.
- Indicators of Compromise (IOCs):
- CastleLoader C2 IP Addresses: 62.60.226.73, 62.60.226.211, 62.60.226.254, 79.132.130.142, 80.77.23.48, 85.158.108.135, 94.159.113.123