CastleLoader Explained: GrayBravo’s MaaS Network & Four Threat Clusters Revealed (2026)

Get ready for a deep dive into the world of cybersecurity and malware, where we uncover the sinister activities of a threat actor known as GrayBravo. This is a story of evolving threats and the constant battle to stay one step ahead.

The Rise of CastleLoader: A Malware-as-a-Service Empire

GrayBravo, a name assigned by Recorded Future's Insikt Group, has been making waves in the cybercriminal underworld. Their tool of choice, CastleLoader, is a malware loader that has become a powerful weapon in their arsenal. But here's where it gets controversial: GrayBravo is not just using this tool; they're offering it as a service to other threat actors, creating a thriving malware-as-a-service (MaaS) model.

The Mastercard-owned Recorded Future describes GrayBravo as a highly sophisticated and responsive threat actor, with a rapidly evolving infrastructure. Their toolset includes a remote access trojan, CastleRAT, and the versatile CastleBot framework, which acts as a loader and backdoor, capable of executing various payloads.

Unveiling the Threat Clusters

Recorded Future's latest analysis has uncovered four distinct clusters of activity, each with its own unique tactics:

  • Cluster 1 (TAG-160): Targeting the logistics sector with phishing and ClickFix techniques, this cluster has been active since at least March 2025, distributing CastleLoader.
  • Cluster 2 (TAG-161): Using Booking.com-themed campaigns, they spread CastleLoader and Matanbuchus 3.0, active since June 2025.
  • Cluster 3: Impersonating Booking.com, they use ClickFix and Steam Community pages to deliver CastleRAT via CastleLoader, active since March 2025.
  • Cluster 4: Employing malvertising and fake software updates, they distribute CastleLoader and NetSupport RAT, active since April 2025.

And this is the part most people miss: GrayBravo's infrastructure is multi-tiered, with victim-facing C2 servers and backup VPS servers, showcasing their operational sophistication.

The Impact and Connections

The attacks by TAG-160 are particularly noteworthy for their use of compromised accounts on freight platforms, enhancing the credibility of their phishing campaigns. This activity demonstrates a deep understanding of the logistics industry and a high level of deception.

There's even a low-confidence assessment suggesting a connection to an unattributed cluster that targeted transportation companies in North America last year. If true, this could indicate a broader campaign.

The Bigger Picture: A Growing Cybercriminal Ecosystem

GrayBravo's success highlights the rapid proliferation of advanced and adaptive tooling within the cybercriminal ecosystem. Once proven effective, these tools can spread like wildfire.

"GrayBravo has significantly expanded its user base, evidenced by the growing number of threat actors leveraging CastleLoader," Recorded Future notes.

So, what does this mean for the future of cybersecurity? How can we stay ahead of these evolving threats? Join the discussion in the comments and share your thoughts on this complex and ever-changing landscape.

CastleLoader Explained: GrayBravo’s MaaS Network & Four Threat Clusters Revealed (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6021

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.