BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Velvet Tempest Links Termite Ransomware to ClickFix CastleRAT Campaign

Velvet Tempest Links Termite Ransomware to ClickFix CastleRAT Campaign

March 8, 2026Malware & Threats2 min readhigh

Originally reported by BleepingComputer

#termite-ransomware#velvet-tempest#clickfix#castlerat#donutloader#social-engineering
Share

TL;DR

Security researchers have linked Termite ransomware deployments to Velvet Tempest threat actors using the ClickFix social engineering technique. The campaign leverages legitimate Windows utilities and deploys DonutLoader malware along with the CastleRAT backdoor to establish persistence before ransomware execution.

Why high?

Active ransomware campaign using sophisticated social engineering techniques combined with legitimate Windows utilities for evasion. The threat actor has demonstrated capability to breach organizations and deploy ransomware payloads.

Campaign Overview

Security researchers at BleepingComputer have identified connections between recent Termite ransomware breaches and the threat actor group Velvet Tempest. The attackers are leveraging the ClickFix social engineering technique alongside legitimate Windows utilities to deploy a multi-stage infection chain.

Attack Chain Analysis

The campaign follows a sophisticated multi-stage approach:

Initial Access

Velvet Tempest employs the ClickFix technique, a social engineering method that tricks users into executing malicious code by presenting fake error messages or system prompts that require user interaction to "fix" supposed issues.

Payload Deployment

Once initial access is achieved, the threat actors deploy:

  • DonutLoader: A reflective loader that executes shellcode and .NET assemblies directly in memory
  • CastleRAT: A remote access trojan providing persistent backdoor access to compromised systems

Living-off-the-Land Tactics

The attackers extensively use legitimate Windows utilities to blend their activities with normal system operations, making detection significantly more challenging for security teams.

Technical Implications

This campaign demonstrates several concerning trends in ransomware operations:

  • Social Engineering Evolution: The ClickFix technique represents a refinement in social engineering tactics, exploiting users' willingness to resolve apparent system issues
  • Evasion Sophistication: By leveraging legitimate Windows tools, attackers reduce their malware footprint and increase the likelihood of bypassing security controls
  • Multi-Stage Infections: The use of multiple payloads allows for greater operational flexibility and redundancy

Detection and Mitigation

Security teams should focus on:

  • Monitoring for unusual execution of legitimate Windows utilities in suspicious contexts
  • Implementing user awareness training specifically covering social engineering techniques like ClickFix
  • Deploying behavioral analysis tools capable of detecting multi-stage infection chains
  • Establishing baseline behaviors for system utilities to identify anomalous usage patterns

Sources

  • https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/

Originally reported by BleepingComputer

Tags

#termite-ransomware#velvet-tempest#clickfix#castlerat#donutloader#social-engineering

Related Intelligence

  • Malware Roundup: BlackSanta EDR Killer, BeatBanker Android Trojan, and Zombie ZIP Evasion

    highMar 11, 2026
  • Trojanized Red Alert App Targets Israeli Users via Fake Government SMS

    highMar 8, 2026
  • Malware Roundup: Healthcare Breach Hits 3.4M, CISA Orders iOS Patches, Phishing Kit Takedown

    highMar 7, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← 2,600+ TLS Certificates Compromised by Private Key Exposure on GitHub and DockerHub

Next Article

Trojanized Red Alert App Targets Israeli Users via Fake Government SMS →