Research from Recorded Future's Insikt Group has shed light on a prolific Malware-as-a-Service (MaaS) operation tracked as GrayBravo. This operation is responsible for the development and distribution of a malware loader named CastleLoader. The service is being utilized by at least four distinct threat activity clusters, enabling them to deploy a wide range of secondary payloads, including information stealers and remote access trojans (RATs). The campaigns demonstrate the specialization within the cybercrime economy, with different GrayBravo 'customers' targeting specific industries like logistics and hospitality using tailored lures. The rise of MaaS providers like GrayBravo lowers the barrier to entry for cybercrime, allowing less sophisticated actors to leverage advanced tools and infrastructure to conduct damaging attacks.
GrayBravo operates as a wholesale supplier of malware, providing the initial access and loading capabilities that other criminal groups then use for their own ends. This specialization allows for greater efficiency and scale in the cybercrime ecosystem.
CastleLoader serves as the initial foothold and delivery mechanism. The attack chains vary depending on the customer, but they share CastleLoader as a common component.
T1566 - Phishing).curl or a similar tool to download and execute a script.T1105 - Ingress Tool Transfer).T1555 - Credentials from Password Stores).This model allows GrayBravo to focus on developing and maintaining the loader and its infrastructure, while its customers focus on social engineering and monetizing the stolen data.
T1566T1204.002T1140T1105T1555The MaaS model exemplified by GrayBravo has a multiplying effect on the threat landscape:
CastleLoaderbooking-pro[.]com/update/zabbix.exeregsvr32.exeregsvr32.exe to execute malicious code. Monitor for unusual parent processes or network activity.Train users to identify and report phishing attempts and social engineering lures.
Use web filters to block access to known malicious domains and categories associated with malvertising.
Mapped D3FEND Techniques:
Use application control to prevent unknown loaders like CastleLoader from executing.
Mapped D3FEND Techniques:
To combat the varied delivery methods used by GrayBravo's customers, such as Booking.com lures and fake Zabbix updates, organizations need robust URL analysis at the network edge. This involves using a secure web gateway or DNS filtering service that can inspect URLs in real-time. The service should categorize and block access to newly registered domains, known malicious domains, and sites associated with malvertising. For the Booking.com-themed attacks, the system should be able to identify typosquatted domains and block them. For the fake software updates, it should block downloads from non-official domains. This automated filtering of web traffic is a critical defense layer that can prevent the initial download of CastleLoader, regardless of whether the entry vector is a phishing email or a malicious ad.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.