Sophisticated Threat Group TAG-150 Targets Organizations

05 Sep 2025

A newly emerged, highly sophisticated cyber threat actor, TAG-150, is making waves with its advanced cyber tools and methods. Since March 2025, the group has employed a unique and intricate infrastructure to orchestrate attacks on organizations and individuals worldwide. Central to TAG-150's operations is a suite of custom malware, with CastleRAT spearheading their efforts.

A Four-Tiered Technical Approach

Recent research by Insikt Group delves into the complexities of TAG-150's infrastructure, which unfolds over four distinct layers. The structure extends from victim-facing command-and-control (C2) servers to intermediary and backup layers that obfuscate the group's malicious activities. These servers orchestrate the deployment of various malware families, such as CastleBot and CastleRAT, the latter of which comes in both Python and C variants.

CastleRAT is particularly notable for its stealth and effectiveness. The Python variant remains almost undetectable by conventional antivirus solutions, able to stealthily collect system data, manage payloads, execute commands, and self-delete. Meanwhile, the C variant offers an even richer feature set with capabilities for keylogging, clipboard hijacking, screencapturing, file transfers, persistence, and sophisticated detection evasion techniques. This makes it a formidable tool for remote control and surveillance.

Deceptive Tactics and Advanced Infrastructure

TAG-150's initial attacks frequently involve phishing exploits, employing fraudulent domains resembling trusted services or development libraries, and malicious scripts from GitHub repositories. These lures trick victims into running codes disguised as debugging tasks or software updates, boasting an infection rate of 28.7% among users interacting with them. Once a system is compromised, TAG-150 swiftly deploys further malware, connecting affected devices to their C2 network.

In efforts to evade detection and hinder law enforcement or mitigation efforts, TAG-150 employs privacy-focused technology such as Lokinet, Mega.nz, and Kleenscan. The group innovates continuously, even using Steam Community pages for C2 'dead drops,' and encapsulating command protocols within WebSockets. Their infrastructure is agile, often relocated between virtual private servers and residential IP ranges, presenting significant challenges in attribution and response.

Recommendations and Future Concerns

To counteract TAG-150’s activities, experts recommend several strategies. Blocking recognized TAG-150 infrastructure and employing updated Sigma, YARA, and Snort detection rules are essential. Filtering suspicious traffic and monitoring potential data breaches are also critical in combating this emerging threat.

The Insikt Group predicts that TAG-150 will persist in innovating and expanding its cyber arsenal, adopting new malware families and privacy-enhancing technologies to prolong its operations. Their continued activity poses a significant threat to organizations around the globe, underscoring the need for vigilant cybersecurity practices and enhanced threat detection capabilities.

  • Indicators of Compromise (IOCs):
  • CastleLoader C2 IP Addresses: 62.60.226.73, 62.60.226.211, 62.60.226.254, 79.132.130.142, 80.77.23.48, 85.158.108.135, 94.159.113.123

Top charts for Desktop Windows

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508630
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735704
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746793
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
497306
downloads

Comments (0)

No comments yet. Be the first to comment!