North Korea-linked ScarCruft is using spear-phishing with RokRAT malware to spy on academics, dubbed the #HanKookPhantom campaign.

Read: https://hackread.com/north-korea-scarcruft-target-academics-rokrat-malware/

#CyberSecurity #NorthKorea #ScarCruft #RokRAT #Malware

North Koreaโ€™s ScarCruft Targets Academics With RokRAT Malware

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto

ScarCruft (APT37) is running Operation HanKook Phantom โ†’ phishing South Korean academics w/ RokRAT malware.
๐Ÿ”น LNK loaders + fileless PowerShell
๐Ÿ”น Exfil via Dropbox & GDrive
๐Ÿ”น Goal: espionage & persistence
๐Ÿ’ฌ Should academia ramp up defenses to enterprise SOC levels, or is that unrealistic?
Follow @technadu for more threat intel.

#CyberSecurity #APT37 #ScarCruft #RokRAT #Phishing #ThreatIntel

North Koreaโ€™s APT37 deploys RokRAT in new phishing campaign against academics

ScarCruft (APT37) launches Operation HanKook Phantom, a phishing campaign using RokRAT to target academics, ex-officials, and researchers.

Security Affairs
RoKRAT Shellcode and Steganographic Threats: Analysis and EDR Response Strategies
#RoKRAT
https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic
RoKRAT Shellcode and Steganographic Threats: Analysis and EDR Response Strategies

A new RoKRAT variant used by APT37 was found hiding malware in image files via steganography and using two-layer encrypted shellcode to evade analysis.

"RokRAT Malware Using Malicious Hangul (.HWP) Documents" published by Ahnlab. #RokRAT, #DPRK, #CTI https://asec.ahnlab.com/en/89130/
RokRAT Malware Using Malicious Hangul (.HWP) Documents - ASEC

RokRAT Malware Using Malicious Hangul (.HWP) Documents ASEC

ASEC
"์•…์„ฑ ํ•œ๊ธ€(.HWP) ๋ฌธ์„œ๋ฅผ ์ด์šฉํ•œ RokRAT ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์ฃผ์˜" published by Ahnlab. #RokRAT, #DPRK, #CTI https://asec.ahnlab.com/ko/89116/
์•…์„ฑ ํ•œ๊ธ€(.HWP) ๋ฌธ์„œ๋ฅผ ์ด์šฉํ•œ RokRAT ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์ฃผ์˜ - ASEC

์•…์„ฑ ํ•œ๊ธ€(.HWP) ๋ฌธ์„œ๋ฅผ ์ด์šฉํ•œ RokRAT ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์ฃผ์˜ ASEC

ASEC
"๋Œ€๋ถ๊ด€๊ณ„์ž๋ฅผ ๋…ธ๋ฆฌ๋Š” ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper)์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk(2025.6.3)" published by Sakai. #APT37, #LNK, #RokRAT, #DPRK, #CTI https://wezard4u.tistory.com/429506
๋Œ€๋ถ๊ด€๊ณ„์ž๋ฅผ ๋…ธ๋ฆฌ๋Š” ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper)์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk(2025.6.3)

์˜ค๋Š˜์€ ์˜ค๋ž˜๊ฐ„๋งŒ์— ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper,APT 37) ์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ์ธ ๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk์— ๋Œ€ํ•ด ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.RoKRAT์€ ๋Œ€ํ•œ๋ฏผ๊ตญ์—์„œ ๋Œ€๋ถ๊ด€๊ณ„์ž ๋ถ„๋“ค์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ๊ฒƒ์ด ํŠน์ง•์ด ์žˆ์œผ๋ฉฐ ๋Œ€๋ถ ์ธ๊ถŒ๋‹จ์ฒด, ๋ถํ•œ ์ทจ์žฌ ๊ธฐ์ž,ํƒˆ๋ถ๋ฏผ,๋Œ€๋ถ ๊ด€ํ•œ ๋Œ€ํ•™๊ต์ˆ˜๋„ ํฌํ•จ์ด ๋ฉ๋‹ˆ๋‹ค.ํŒŒ์ผ๋ช…:๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk์‚ฌ์ด์ฆˆ:52 MBMD5:f6d72abf9ca654a20bbaf23ea1c10a55SHA-1:543e3b4b74257c3ffcd45dcdd8c842489a82bc07SHA-256:90bf1f20f962d04f8ae3f936d0f9046da28a75fa2fb37f267ff0453f272c60a0์ž…๋‹ˆ๋‹ค.์•…์„ฑ์ฝ”๋“œ PowerShell ์ฝ”๋“œStringData{ namestring: ..

๊ฟˆ์„๊พธ๋Š” ํŒŒ๋ž‘์ƒˆ
"Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)" published by Genians. #APT37, #LNK, #ToyBoxStory, #RokRAT, #DPRK, #CTI https://www.genians.co.kr/en/blog/threat_intelligence/toybox-story
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)

APT37 used Dropbox to spread ZIP files with malicious LNK files that filelessly executed RoKRAT and triggered extra malware with the keyword โ€˜toyโ€™.

"ํ•œ๊ตญ ๊ตญ๊ฐ€์•ˆ๋ณด์ „๋žต ์‹ฑํฌํƒฑํฌ ์œ„์žฅ APT37 ๊ณต๊ฒฉ ์‚ฌ๋ก€ ๋ถ„์„ (์ž‘์ „๋ช…. ํ† ์ด๋ฐ•์Šค ์Šคํ† ๋ฆฌ)" published by Genians. #APT37, #LNK, #RokRAT, #ToyBoxStory, #DPRK, #CTI https://www.genians.co.kr/blog/threat_intelligence/toybox-story
ํ•œ๊ตญ ๊ตญ๊ฐ€์•ˆ๋ณด์ „๋žต ์‹ฑํฌํƒฑํฌ ์œ„์žฅ APT37 ๊ณต๊ฒฉ ์‚ฌ๋ก€ ๋ถ„์„ (์ž‘์ „๋ช…. ํ† ์ด๋ฐ•์Šค ์Šคํ† ๋ฆฌ)

25๋…„ 3์›”, APT37 ๊ทธ๋ฃน์ด ๋“œ๋กญ๋ฐ•์Šค๋ฅผ ์•…์šฉํ•ด LNK๊ฐ€ ํฌํ•จ๋œ ์••์ถ• ํŒŒ์ผ์„ ์œ ํฌํ–ˆ์Šต๋‹ˆ๋‹ค. LNK ํŒŒ์ผ์— ์•…์„ฑ ์ฝ”๋“œ๋ฅผ ์‚ฝ์ž…ํ•œ ๋’ค RoKRAT์„ ํŒŒ์ผ๋ฆฌ์Šค ๋ฐฉ์‹์œผ๋กœ ์‹คํ–‰ํ•˜๋Š” ์ „๋žต์„ ๊ตฌ์‚ฌํ–ˆ์œผ๋ฉฐ, ํŒŒ์ผ ์‹คํ–‰ ์‹œ โ€˜toyโ€™ ํ‚ค์›Œ๋“œ๊ฐ€ ํฌํ•จ๋œ ์ถ”๊ฐ€ ์•…์„ฑ ์ฝ”๋“œ๊ฐ€ ์ž‘๋™ํ•˜๋„๋ก ์„ค๊ณ„ํ–ˆ์Šต๋‹ˆ๋‹ค.

"ํ•œ๊ธ€ ๋ฌธ์„œ๋กœ ์œ„์žฅํ•œ ๋‘ ๊ณต๊ฒฉ ๊ทธ๋ฃน์˜ ์•…์„ฑ์ฝ”๋“œ ๋น„๊ต" published by Logpresso. #APT37, #Konni, #RokRAT, #LNK, #DPRK, #CTI https://logpresso.com/ko/blog/2025-04-17-cti-report-vol11
๋กœ๊ทธํ”„๋ ˆ์†Œ CTI ๋ฆฌํฌํŠธ_Vol.11 | ๋กœ๊ทธํ”„๋ ˆ์†Œ

์ œ11ํ˜ธ์—์„œ๋Š” ์ง€๋‚œ 1๋ถ„๊ธฐ์— ๋ฐœ์ƒํ•œ ์œ„ํ˜‘ ๋ถ„์„๊ณผ ํ•จ๊ป˜ ASM์„ ํ™œ์šฉํ•œ ํ†ตํ•ฉ ๋ณด์•ˆ ์ „๋žต์— ๋Œ€ํ•ด ๋‹ค๋ฃจ์—ˆ์Šต๋‹ˆ๋‹ค.

๋กœ๊ทธํ”„๋ ˆ์†Œ