TAG-150 Hackers Use Custom-Built Malware Families to Target Organizations

A newly identified cyber threat group known as TAG-150 has quickly established itself as a major security concern. Since March 2025, the group has demonstrated the ability to develop and launch multiple custom-built malware families, showcasing both technical skill and rapid evolution.

Their arsenal includes CastleLoader, CastleBot, and the latest addition CastleRAT, a sophisticated Remote Access Trojan (RAT) that highlights their growing operational maturity.

Infection Tactics

TAG-150 primarily relies on Cloudflare-themed “ClickFix” phishing lures and malicious GitHub repositories disguised as legitimate applications. Victims are tricked into executing malicious PowerShell commands, which creates the illusion of a user-initiated compromise. This approach effectively bypasses many traditional security defenses.

Despite having limited campaigns, the group achieved a 28.7% infection success rate among users who engaged with malicious links, a figure that highlights the effectiveness of their social engineering techniques.

Multi-Tier Infrastructure

Security researchers from Recorded Future uncovered a multi-layered infrastructure designed to support TAG-150’s activities. This network features four distinct tiers, including:

  • Tier 1 servers – victim-facing systems hosting malware families
  • Tier 2 servers – accessible via RDP for managing infected systems
  • Tier 3 and Tier 4 infrastructure – dedicated to operational management and backup redundancy

This structure reflects advanced security awareness, operational redundancy, and strong command-and-control resilience.

Multi-tiered infrastructure linked to TAG-150 (Source – Recordedfuture)

The malware delivery system also functions as a launchpad for secondary payloads such as SectopRAT, WarmCookie, HijackLoader, NetSupport RAT, and numerous information stealers including Stealc, RedLine Stealer, and Rhadamanthys Stealer. This variety suggests TAG-150 is either running a Malware-as-a-Service (MaaS) operation or collaborating with other cybercriminal groups.

Advanced Malware Capabilities

The most notable tool in TAG-150’s toolkit is CastleRAT, available in Python and C variants, each offering distinct technical features.

  • Custom Binary Protocol – uses RC4 encryption with hard-coded 16-byte keys for secure communications.
  • Geolocation Intelligence – both variants call the ip-api.com API to collect location data based on public IP addresses.
  • Enhanced C Variant – includes keylogging, screen capture, clipboard monitoring, and process injection for stealth.
  • Innovative C2 Channels – leverages Steam Community pages as C2 deaddrops, a creative method to evade detection.
  • Persistence & Evasion – maintains persistence via registry changes and disguises itself as a browser process.
  • Python Variant – capable of self-deletion via PowerShell commands.

To enhance stealth, TAG-150 also uses anti-detection services such as Kleenscan, ensuring prolonged activity while avoiding exposure.

Conclusion

TAG-150’s rapid development, custom malware ecosystem, and innovative evasion techniques make it a high-priority threat. With capabilities that include multi-tiered infrastructure, social engineering-driven infections, and persistent malware, the group is poised to remain a significant cybersecurity challenge.