Research from Recorded Future's Insikt Group has shed light on a prolific Malware-as-a-Service (MaaS) operation tracked as GrayBravo. This operation is responsible for the development and distribution of a malware loader named CastleLoader. The service is being utilized by at least four distinct threat activity clusters, enabling them to deploy a wide range of secondary payloads, including information stealers and remote access trojans (RATs). The campaigns demonstrate the specialization within the cybercrime economy, with different GrayBravo 'customers' targeting specific industries like logistics and hospitality using tailored lures. The rise of MaaS providers like GrayBravo lowers the barrier to entry for cybercrime, allowing less sophisticated actors to leverage advanced tools and infrastructure to conduct damaging attacks.
GrayBravo operates as a wholesale supplier of malware, providing the initial access and loading capabilities that other criminal groups then use for their own ends. This specialization allows for greater efficiency and scale in the cybercrime ecosystem.
CastleLoader serves as the initial foothold and delivery mechanism. The attack chains vary depending on the customer, but they share CastleLoader as a common component.
T1566 - Phishing).curl or a similar tool to download and execute a script.T1105 - Ingress Tool Transfer).T1555 - Credentials from Password Stores).This model allows GrayBravo to focus on developing and maintaining the loader and its infrastructure, while its customers focus on social engineering and monetizing the stolen data.
| Tactic | Technique ID | Name | Description |
|---|---|---|---|
| Initial Access | T1566 |
Phishing | Various phishing techniques are used by GrayBravo's customers to deliver the initial lure. |
| Execution | T1204.002 |
User Execution: Malicious File | The 'ClickFix' method relies on the user executing a malicious command. |
| Defense Evasion | T1140 |
Deobfuscate/Decode Files or Information | Loaders like CastleLoader often use obfuscation to hide their C2 and payloads. |
| Command and Control | T1105 |
Ingress Tool Transfer | CastleLoader's primary function is to download further payloads from the C2. |
| Credential Access | T1555 |
Credentials from Password Stores | A common objective of the final payloads, like RedLine Stealer. |
The MaaS model exemplified by GrayBravo has a multiplying effect on the threat landscape:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| malware_family | CastleLoader |
Signatures or behavioral rules specific to CastleLoader. | Antivirus, EDR. | high |
| domain | booking-pro[.]com |
Example of a malicious domain used in Booking.com-themed phishing lures. | DNS logs, proxy logs. | high |
| url_pattern | /update/zabbix.exe |
Fake software update URLs used in malvertising campaigns to drop the loader. | Web proxy logs, NIDS. | high |
| process_name | regsvr32.exe |
Loaders often use legitimate Windows binaries like regsvr32.exe to execute malicious code. Monitor for unusual parent processes or network activity. |
EDR, Sysmon. | medium |
Train users to identify and report phishing attempts and social engineering lures.
Use web filters to block access to known malicious domains and categories associated with malvertising.
Mapped D3FEND Techniques:
Use application control to prevent unknown loaders like CastleLoader from executing.
Mapped D3FEND Techniques:
To combat the varied delivery methods used by GrayBravo's customers, such as Booking.com lures and fake Zabbix updates, organizations need robust URL analysis at the network edge. This involves using a secure web gateway or DNS filtering service that can inspect URLs in real-time. The service should categorize and block access to newly registered domains, known malicious domains, and sites associated with malvertising. For the Booking.com-themed attacks, the system should be able to identify typosquatted domains and block them. For the fake software updates, it should block downloads from non-official domains. This automated filtering of web traffic is a critical defense layer that can prevent the initial download of CastleLoader, regardless of whether the entry vector is a phishing email or a malicious ad.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats