Intelligence
criticalMalwareActive

Termite Ransomware Campaign Leverages ClickFix for Malware Deployment

Ransomware operators are using a combination of legitimate Windows tools and the ClickFix technique to deploy DonutLoader malware and CastleRAT backdoors, posing a significant threat to systems.

S
Sebastion

Affected

Windows systems

The recent discovery of Termite ransomware breaches linked to ClickFix CastleRAT attacks reveals a sophisticated campaign by the Velvet Tempest group. This group is using legitimate Windows utilities alongside the ClickFix technique to deploy DonutLoader malware and establish persistent backdoors through CastleRAT. The integration of known tools like ClickFix with new malware strains indicates an advanced approach to evading detection and maintaining persistence.

The use of legitimate system tools makes it challenging for traditional antivirus solutions to detect these activities, as they appear as normal system operations. This technique allows the attackers to achieve stealth while deploying their malicious payloads. The deployment of CastleRAT backdoors suggests that this campaign is not limited to ransomware; it may also be part of a broader attack strategy aimed at long-term access and data exfiltration.

Defenders should prioritize monitoring for signs of ClickFix activity, DonutLoader components, and CastleRAT indicators. Implementing robust endpoint detection solutions capable of identifying unusual patterns in legitimate tool usage is crucial. Additionally, regular patching and updates to Windows systems can mitigate the risk of exploitation through known vulnerabilities. The broader implication of this campaign highlights the evolving nature of ransomware attacks, where attackers increasingly rely on sophisticated techniques to maximize their impact.