Hackers Tie Iranian Espionage to CastleRAT and ChainShell
A direct operational link between Iran’s MuddyWater espionage group and the Russian TAG-150 CastleRAT malware-as-a-service (MaaS) platform, showing how state and criminal ecosystems are now tightly intertwined. Investigators recovered 15 malware samples, including at least two CastleRAT “builds” and
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · IR
- [CONFLICT] [Correspondence] Systematic health destruction in Iran by Operation Epic Fury
- [CONFLICT] İran basını: Hürmüz'den bir tanker gemisi daha geçti
- [CONFLICT] US planning renewed military action against Iranian infrastructure should talks fail - CNN
- [CONFLICT] Trump kill order highlights threat of Iran’s small, fast-attack boats
- [CONFLICT] Trump says U.S. in no rush but 'clock is ticking' for Iran
- [CONFLICT] Iran-US war latest: Trump threatens to review UK claim to Falklands over lack of support for Iran war