CastleRAT Exploits Deno Runtime To Bypass Enterprise Security

CastleRAT Exploits Deno Runtime To Bypass Enterprise Security
CastleRAT Exploits Deno Runtime To Bypass Enterprise Security
In a groundbreaking cybersecurity case, ThreatDown Research recently uncovered the first documented use of the Deno JavaScript runtime in a CastleRAT attack.

This sophisticated attack chain bypasses traditional security measures, marking a significant leap in cybercriminal techniques.

The campaign uniquely exploits Deno, a popular, trusted runtime environment, to execute CastleRAT, a powerful remote access tool used for espionage and data theft.

This attack demonstrates how creative and stealthy modern malware campaigns have become, with attackers going to great lengths to avoid detection.

The “ClickFix” Social Engineering Trap and Deno Exploitation

The attack starts with a simple yet effective social engineering tactic called ClickFix, in which the victim is tricked into pasting a command into the Windows terminal to “fix” a browser error or CAPTCHA.

By bypassing traditional web security measures, the attackers cause the user to execute a command that silently downloads the malicious installer. This approach cleverly uses human error, making it harder to prevent and more likely to succeed.

CastleRAT Uses Deno Evasion (Source: threatdown)
CastleRAT Uses Deno Evasion (Source: threatdown)

Once the attacker has access to the system, instead of deploying malware immediately, they first install Deno, a legitimate and trusted runtime.

Antivirus software, typically configured to ignore Deno due to its digital signature, does not flag its installation.

CastleRAT Uses Deno Evasion (Source: threatdown)
CastleRAT Uses Deno Evasion (Source: threatdown)

This sets the stage for the next step: the attackers use Deno as a Trojan horse to execute obfuscated JavaScript.

Since Deno is a trusted process, the malware runs withelevated privileges, effectively bypassing traditional detection mechanisms.

Stealthy Execution and CastleRAT Payload Delivery

After the Deno runtime is established, the attackers further obscure their activity. The JavaScript code executed by Deno downloads a Python environment, cleverly disguised as Petuhon, and a JPEG image (CFBAT.jpg).

While the image seems harmless, it actually contains an encrypted CastleRAT payload. The Python script, protected by PyArmor, decodes the payload directly into memory using a technique known as reflective PE loading, meaning the malware never touches the disk.

CastleRAT Uses Deno Evasion (Source: threatdown)
CastleRAT Uses Deno Evasion (Source: threatdown)

This method evades file-scanning antivirus engines, making it virtually invisible to traditional security tools.

It sends this data to a Command and Control (C2) server. The malware also uses low-level Windows APIs to perform keylogging, clipboard hijacking, and data exfiltration, targeting sensitive information like cryptocurrency wallet files, browsing history, and developer credentials.

According to Threatdown research, to defend against such threats, organizations need to adopt behavioral monitoring and implement endpoint detection and response (EDR) tools.

Indicator Type Indicator Value
C2 Domain dsennbuappec[.]zhivachkapro[.]com
C2 Domain serialmenot[.]com
IP Address 172[.]86.123.222
IP Address 23[.]94.145.120
SHA256 Hash aae017e7a36e016655c91bd01b4f3c46309bbe540733f82cce29392e72e9bd1f
SHA256 Hash a4787a42070994b7f1222025828faf9b153710bb730e58da710728e148282e28
Associated File clickzpaqkvba.msi
Associated File november_block25.vbs

This innovative attack underscores the need for evolving security strategies that go beyond traditional methods, focusing on detecting and responding to suspicious behavior, rather than relying solely on static defenses.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post CastleRAT Exploits Deno Runtime To Bypass Enterprise Security appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading