Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

APT37 Hackers Use JPEGs to Hack Windows

August 5, 2025
Reading Time: 3 mins read
in Alerts
Plague Malware Targets Linux Servers

The recent APT37 campaign leverages a highly refined infection process to deploy its RoKRAT malware, focusing on evading traditional security defenses. The attack starts with a deceptive compressed archive, often a ZIP file, that contains a large Windows shortcut (.lnk) file. When a user opens this shortcut, it triggers a multi-stage process that uses PowerShell commands and a batch script to execute a malicious payload. This initial stage is designed to capitalize on user trust, as the seemingly harmless shortcut file is often disguised with a legitimate decoy document to mislead the victim.

Once activated, the attack chain progresses with the execution of a batch script that launches a PowerShell command.

This command is responsible for decrypting an encrypted shellcode payload using an XOR operation. This fileless approach is a critical element of the attack, as it avoids dropping traditional malware files onto the disk, thereby leaving minimal forensic traces. The decrypted shellcode is then injected into trusted, legitimate Windows processes like mspaint.exe or notepad.exe. By hijacking these native processes, the malware effectively conceals its malicious activity and bypasses many signature-based antivirus and heuristic detection systems that would otherwise flag suspicious executable files.

A significant enhancement in this campaign is the use of steganography, where the core RoKRAT modules are hidden within innocent-looking JPEG image files. These JPEGs are distributed via legitimate cloud storage providers such as Dropbox and Yandex, further complicating detection. For instance, an image file like “Father.jpg” appears as a valid photo, but a closer analysis reveals encrypted shellcode concealed within the image data. The malware extracts and decodes this hidden payload, executing the malicious RoKRAT code from within a legitimate image file, thus bypassing conventional file-based detection mechanisms that scan for malicious executables.

After successful deployment, the RoKRAT malware focuses on its primary objective: data exfiltration. It systematically collects sensitive information, including documents, screenshots, and session data, from the infected endpoint. To avoid detection, the malware abuses legitimate cloud APIs for its command and control (C2) communication. By using genuine cloud tokens and registered accounts linked to services like Dropbox and Yandex, the attackers can blend their malicious traffic with normal, legitimate network activity. This tactic not only makes attribution more difficult for defenders but also frustrates efforts to identify suspicious traffic patterns and block the communication channels used by the malware.

The campaign highlights the urgent need for a more advanced and proactive approach to cybersecurity. The technical agility of APT37, demonstrated by their switching of injection targets and careful camouflage of developer artifacts, necessitates a move beyond static, signature-based defenses. The use of steganography and fileless methods underscores the importance of advanced Endpoint Detection and Response (EDR) solutions that focus on behavioral monitoring. Security teams must also prioritize regular user awareness training, strict endpoint management, and proactive monitoring of cloud service traffic to combat these state-sponsored threats effectively. This evolution in attack methods requires a corresponding evolution in defense strategies to mitigate the risks posed by such sophisticated adversaries.

Reference:

  • APT37 Hackers Exploit JPEG Files to Compromise Windows Systems via Mspaint
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial