Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

APT37 Hackers Use JPEGs to Hack Windows

August 5, 2025
Reading Time: 3 mins read
in Alerts
Plague Malware Targets Linux Servers

The recent APT37 campaign leverages a highly refined infection process to deploy its RoKRAT malware, focusing on evading traditional security defenses. The attack starts with a deceptive compressed archive, often a ZIP file, that contains a large Windows shortcut (.lnk) file. When a user opens this shortcut, it triggers a multi-stage process that uses PowerShell commands and a batch script to execute a malicious payload. This initial stage is designed to capitalize on user trust, as the seemingly harmless shortcut file is often disguised with a legitimate decoy document to mislead the victim.

Once activated, the attack chain progresses with the execution of a batch script that launches a PowerShell command.

This command is responsible for decrypting an encrypted shellcode payload using an XOR operation. This fileless approach is a critical element of the attack, as it avoids dropping traditional malware files onto the disk, thereby leaving minimal forensic traces. The decrypted shellcode is then injected into trusted, legitimate Windows processes like mspaint.exe or notepad.exe. By hijacking these native processes, the malware effectively conceals its malicious activity and bypasses many signature-based antivirus and heuristic detection systems that would otherwise flag suspicious executable files.

A significant enhancement in this campaign is the use of steganography, where the core RoKRAT modules are hidden within innocent-looking JPEG image files. These JPEGs are distributed via legitimate cloud storage providers such as Dropbox and Yandex, further complicating detection. For instance, an image file like “Father.jpg” appears as a valid photo, but a closer analysis reveals encrypted shellcode concealed within the image data. The malware extracts and decodes this hidden payload, executing the malicious RoKRAT code from within a legitimate image file, thus bypassing conventional file-based detection mechanisms that scan for malicious executables.

After successful deployment, the RoKRAT malware focuses on its primary objective: data exfiltration. It systematically collects sensitive information, including documents, screenshots, and session data, from the infected endpoint. To avoid detection, the malware abuses legitimate cloud APIs for its command and control (C2) communication. By using genuine cloud tokens and registered accounts linked to services like Dropbox and Yandex, the attackers can blend their malicious traffic with normal, legitimate network activity. This tactic not only makes attribution more difficult for defenders but also frustrates efforts to identify suspicious traffic patterns and block the communication channels used by the malware.

The campaign highlights the urgent need for a more advanced and proactive approach to cybersecurity. The technical agility of APT37, demonstrated by their switching of injection targets and careful camouflage of developer artifacts, necessitates a move beyond static, signature-based defenses. The use of steganography and fileless methods underscores the importance of advanced Endpoint Detection and Response (EDR) solutions that focus on behavioral monitoring. Security teams must also prioritize regular user awareness training, strict endpoint management, and proactive monitoring of cloud service traffic to combat these state-sponsored threats effectively. This evolution in attack methods requires a corresponding evolution in defense strategies to mitigate the risks posed by such sophisticated adversaries.

Reference:

  • APT37 Hackers Exploit JPEG Files to Compromise Windows Systems via Mspaint
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025
Hackers Abuse WordPress for Phishing

Hackers Abuse WordPress for Phishing

October 10, 2025
Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

October 10, 2025
Hackers Abuse WordPress for Phishing

Android Spyware ClayRat Imitates Apps

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial