Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Termite ransomware breaches linked to ClickFix CastleRAT attacks
    Cybersecurity

    Termite ransomware breaches linked to ClickFix CastleRAT attacks

    adminBy adminMarch 7, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Termite
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Termite

    Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.

    Researchers at cyber-deception threat intelligence firm MalBeacon observed the hackers’ actions in an emulated organization environment over a period of 12 days.

    Velvet Tempest, also tracked as DEV-0504, is a threat group that has been involved in ransomware attacks as an affiliate for at least five years.

    The actor has been associated with deploying some of the most devastating ransomware strains: Ryuk (2018 – 2020), REvil (2019-2022), Conti (2019-2022), BlackMatter, BlackCat/ALPHV (2021-2024), LockBit, and RansomHub.

    Velvet Tempest's ransomware deployment timeline
    Velvet Tempest’s ransomware deployment timeline
    Source: MalBeacon

    The attack was observed by MalBeacon between February 3 and 16 in a replica environment for a non-profit organization in the U.S. with more than 3,000 endpoints and over 2,500 users.

    After obtaining access, Velvet Tempest operators performed hands-on keyboard activities, including Active Directory reconnaissance, host discovery, and environment profiling, as well as using a PowerShell script to harvest credentials stored in Chrome.

    The script was hosted on an IP address that researchers linked to tool staging for Termite ransomware intrusions.

    According to the researchers, Velvet Tempest gained initial access through a malvertising campaign that led to a ClickFix and CAPTCHA mix that instructed victims to paste an obfuscated command into the Windows Run dialog.

    ClickFix lure used by Velvet Tempest
    ClickFix lure used by Velvet Tempest
    Source: MalBeacon

    The pasted command triggered nested cmd.exe chains and used finger.exe to fetch the first malware loaders. One of the payloads was an archive file disguised as a PDF file.

    In subsequent stages, Velvet Tempest used PowerShell to download and execute commands that fetched additional payloads, compile .NET components via csc.exe in temporary directories, and deploy Python-based components for persistence in C:\ProgramData.

    The operation ultimately staged DonutLoader and retrieved CastleRAT backdoor, a remote access trojan associated with the CastleLoader malware loader known for distributing multiple families of RATs and information stealers, like LummaStealer.

    Termite ransomware has previously claimed high-profile victims such as SaaS provider Blue Yonder and Australian IVF giant Genea.

    While Velvet Tempest is typically associated with double-extortion attacks, where victim systems are encrypted after stealing company data, MalBeacon’s report notes that the threat actor did not deploy the Termite ransomware in the observed intrusion.

    Multiple ransomware actors have adopted the CkickFix technique in attacks. Sekoia reported in April 2025 that the Interlock ransomware gang used the social engineering method to breach corporate networks.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    attacks Breaches CastleRAT ClickFix linked ransomware Termite
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI switched back to Samsung Tizen and it’s so much better than Google TV
    Next Article Why a long HDMI cable is the best thing I’ve bought in months
    admin
    • Website

    Related Posts

    Cursor Automations turns code review and ops into background tasks

    March 7, 2026

    Over 100 GitHub Repositories Distributing BoryptGrab Stealer

    March 7, 2026

    Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

    March 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Cursor Automations turns code review and ops into background tasks

    March 7, 2026

    Why a long HDMI cable is the best thing I’ve bought in months

    March 7, 2026

    Termite ransomware breaches linked to ClickFix CastleRAT attacks

    March 7, 2026

    I switched back to Samsung Tizen and it’s so much better than Google TV

    March 7, 2026
    Categories
    • Blogging (34)
    • Cybersecurity (657)
    • Privacy & Online Earning (93)
    • SEO & Digital Marketing (415)
    • Tech Tools & Mobile / Apps (800)
    • WiFi / Internet & Networking (114)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Cursor Automations turns code review and ops into background tasks

    March 7, 2026

    Why a long HDMI cable is the best thing I’ve bought in months

    March 7, 2026

    Termite ransomware breaches linked to ClickFix CastleRAT attacks

    March 7, 2026
    Most Popular
    • Cursor Automations turns code review and ops into background tasks
    • Why a long HDMI cable is the best thing I’ve bought in months
    • Termite ransomware breaches linked to ClickFix CastleRAT attacks
    • I switched back to Samsung Tizen and it’s so much better than Google TV
    • Over 100 GitHub Repositories Distributing BoryptGrab Stealer
    • Firefox Nightly for Developers 150.0a1 APK Download by Mozilla
    • House of Moto Indigo offers ‘depth’ to Motorola’s future, alongside a GrapheneOS partnership
    • Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.