Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

North Korea APT37 Uses RokRAT In Phishing

September 1, 2025
Reading Time: 3 mins read
in Alerts
North Korea APT37 Uses RokRAT In Phishing

North Korea’s state-sponsored hacking group, ScarCruft (APT37), launched “Operation HanKook Phantom,” a phishing campaign using a fake newsletter and malicious files to target South Korean academics, researchers, and ex-officials. The campaign deploys the RokRAT malware, which enables data theft, espionage, and remote control of compromised systems through a complex, multi-stage infection process designed to evade detection.

North Korea’s state-sponsored threat group, APT37 (also known as ScarCruft), has launched a sophisticated cyber espionage campaign dubbed “Operation HanKook Phantom.” This operation, uncovered by cybersecurity firm Seqrite Labs, uses tailored spear-phishing attacks to target high-value individuals in South Korea, including academics, researchers, and former government officials. The primary goals are to steal data, maintain long-term access, and facilitate intelligence gathering. The campaign highlights the persistent and evolving threat posed by North Korean actors, who continue to refine their tactics to achieve state-sponsored objectives.

The attack chain begins with a seemingly harmless email containing a malicious shortcut (.LNK) file disguised as a legitimate document, such as a “National Intelligence Research Society Newsletter.” When a victim clicks on this disguised file, it triggers a multi-stage infection process. The LNK file executes embedded commands, typically using PowerShell scripts, to download and execute the final payload. This method is effective because it bypasses traditional file-based security measures, as the malicious code isn’t a typical executable file but rather a command-line script that executes a process in the system’s memory.

The payload delivered in this campaign is a new variant of the RokRAT malware, a remote access trojan (RAT) believed to be the exclusive work of APT37. RokRAT is designed to be highly evasive and stealthy. It uses fileless in-memory execution, meaning it runs directly in the computer’s memory without writing a file to the hard drive, making it difficult for signature-based antivirus solutions to detect. The malware also incorporates anti-virtual machine (anti-VM) features to identify and evade analysis in sandbox environments used by security researchers.

The RokRAT malware is a powerful tool for espionage.

It fingerprints the infected host to gather system information and supports a range of malicious commands, including remote execution, data exfiltration, and screen captures. For command-and-control (C2) communication and data exfiltration, the malware leverages legitimate, trusted cloud services like Dropbox, pCloud, and Yandex. This “living off the land” approach, using common services for malicious purposes, makes its traffic blend in with normal network activity, making detection and blocking significantly harder for security teams.

This campaign is part of a broader pattern of cyber activity by ScarCruft, which has been active since at least 2012. The group has historically targeted government, defense, and media organizations in South Korea. Another recent campaign by ScarCruft used a malicious LNK file disguised as a statement from North Korean official Kim Yo Jong. Both campaigns showcase the group’s continued reliance on sophisticated spear-phishing and highly customized lures that prey on the specific interests of their targets. The persistent and evolving nature of these attacks underscores the critical need for proactive monitoring and user awareness to counter the threat of state-sponsored espionage.

Reference:

  • North Korea APT37 Launches RokRAT Phishing Campaign Targeting Academics
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Extortion Group Leaks Salesforce Data

Malicious Npm Packages Used In Phishing

October 13, 2025
Extortion Group Leaks Salesforce Data

Fake Inflation Refund Text Scam Hits NY

October 13, 2025
Extortion Group Leaks Salesforce Data

Rust Malware ChaosBot Exploits Discord

October 13, 2025
BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025

Latest Alerts

Malicious Npm Packages Used In Phishing

Fake Inflation Refund Text Scam Hits NY

Rust Malware ChaosBot Exploits Discord

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Subscribe to our newsletter

    Latest Incidents

    Harvard Probes Breach Tied To Oracle Flaw

    Qilin Ransomware Hits Beer Giant Asahi

    Fortra Reports GoAnywhere MFT Breach

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial