#ESETresearch uncovered aโ€ฏmultiplatform supply-chain attack by the ๐Ÿ‡ฐ๐Ÿ‡ต #ScarCruft APT group targeting the Yanbian region via backdoor-laced Windows and Android games. https://www.welivesecurity.com/en/eset-research/rigged-game-scarcruft-compromises-gaming-platform-supply-chain-attack/
In the attack, likely ongoing since late 2024, ScarCruft compromised sqgame, a video game platform used by ethnic Koreans living in the #Yanbian region in China โ€“ home to ethnic Koreans and a crossing point for North Korean refugees and defectors.
The sqgame Windows client was compromised through a malicious update serving the #RokRAT backdoor, which deployed ScarCruftโ€™s more advanced #BirdCall backdoor. Android games were trojanized with the Android version of BirdCall โ€“ a new tool in ScarCruftโ€™s arsenal.
The Android version of BirdCall implements a subset of the capabilities of its Windows counterpart โ€“ it collects contacts, SMS messages, call logs, and various documents, media files, and private keys. It can also take screenshots and record surrounding audio.
We believe that this campaign is probably aimed at collecting information on individuals in the Yanbian region and deemed of interest to the ๐Ÿ‡ฐ๐Ÿ‡ต regime.
IoCs available in our GitHub repo: https://github.com/eset/malware-ioc/tree/master/scarcruft

Read the full analysis on WeLiveSecurity: https://www.welivesecurity.com/en/eset-research/rigged-game-scarcruft-compromises-gaming-platform-supply-chain-attack/#article-2

APT37 Exploits Facebook for RokRAT Malware Delivery

North Korean hackers APT37 have cleverly turned Facebook friend requests into a sneaky way to deliver RokRAT malware, exploiting our natural tendency to trust social connections. By accepting a friend request, victims unwittingly open the door to a remote access trojan that can compromise their device.

https://osintsights.com/apt37-exploits-facebook-for-rokrat-malware-delivery?utm_source=mastodon&utm_medium=social

#Apt37 #Rokrat #SocialEngineering #MalwareDelivery #NorthKorea

APT37 Exploits Facebook for RokRAT Malware Delivery

APT37 uses Facebook to deliver RokRAT malware via friend requests. Learn how this North Korean group's social engineering campaign works and protect yourself now.

OSINTSights

North Korea-linked ScarCruft is using spear-phishing with RokRAT malware to spy on academics, dubbed the #HanKookPhantom campaign.

Read: https://hackread.com/north-korea-scarcruft-target-academics-rokrat-malware/

#CyberSecurity #NorthKorea #ScarCruft #RokRAT #Malware

North Koreaโ€™s ScarCruft Targets Academics With RokRAT Malware

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto

ScarCruft (APT37) is running Operation HanKook Phantom โ†’ phishing South Korean academics w/ RokRAT malware.
๐Ÿ”น LNK loaders + fileless PowerShell
๐Ÿ”น Exfil via Dropbox & GDrive
๐Ÿ”น Goal: espionage & persistence
๐Ÿ’ฌ Should academia ramp up defenses to enterprise SOC levels, or is that unrealistic?
Follow @technadu for more threat intel.

#CyberSecurity #APT37 #ScarCruft #RokRAT #Phishing #ThreatIntel

North Koreaโ€™s APT37 deploys RokRAT in new phishing campaign against academics

ScarCruft (APT37) launches Operation HanKook Phantom, a phishing campaign using RokRAT to target academics, ex-officials, and researchers.

Security Affairs
RoKRAT Shellcode and Steganographic Threats: Analysis and EDR Response Strategies
#RoKRAT
https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic
RoKRAT Shellcode and Steganographic Threats: Analysis and EDR Response Strategies

A new RoKRAT variant used by APT37 was found hiding malware in image files via steganography and using two-layer encrypted shellcode to evade analysis.

"RokRAT Malware Using Malicious Hangul (.HWP) Documents" published by Ahnlab. #RokRAT, #DPRK, #CTI https://asec.ahnlab.com/en/89130/
RokRAT Malware Using Malicious Hangul (.HWP) Documents - ASEC

RokRAT Malware Using Malicious Hangul (.HWP) Documents ASEC

ASEC
"์•…์„ฑ ํ•œ๊ธ€(.HWP) ๋ฌธ์„œ๋ฅผ ์ด์šฉํ•œ RokRAT ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์ฃผ์˜" published by Ahnlab. #RokRAT, #DPRK, #CTI https://asec.ahnlab.com/ko/89116/
์•…์„ฑ ํ•œ๊ธ€(.HWP) ๋ฌธ์„œ๋ฅผ ์ด์šฉํ•œ RokRAT ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์ฃผ์˜ - ASEC

์•…์„ฑ ํ•œ๊ธ€(.HWP) ๋ฌธ์„œ๋ฅผ ์ด์šฉํ•œ RokRAT ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์ฃผ์˜ ASEC

ASEC
"๋Œ€๋ถ๊ด€๊ณ„์ž๋ฅผ ๋…ธ๋ฆฌ๋Š” ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper)์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk(2025.6.3)" published by Sakai. #APT37, #LNK, #RokRAT, #DPRK, #CTI https://wezard4u.tistory.com/429506
๋Œ€๋ถ๊ด€๊ณ„์ž๋ฅผ ๋…ธ๋ฆฌ๋Š” ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper)์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk(2025.6.3)

์˜ค๋Š˜์€ ์˜ค๋ž˜๊ฐ„๋งŒ์— ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper,APT 37) ์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ์ธ ๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk์— ๋Œ€ํ•ด ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.RoKRAT์€ ๋Œ€ํ•œ๋ฏผ๊ตญ์—์„œ ๋Œ€๋ถ๊ด€๊ณ„์ž ๋ถ„๋“ค์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ๊ฒƒ์ด ํŠน์ง•์ด ์žˆ์œผ๋ฉฐ ๋Œ€๋ถ ์ธ๊ถŒ๋‹จ์ฒด, ๋ถํ•œ ์ทจ์žฌ ๊ธฐ์ž,ํƒˆ๋ถ๋ฏผ,๋Œ€๋ถ ๊ด€ํ•œ ๋Œ€ํ•™๊ต์ˆ˜๋„ ํฌํ•จ์ด ๋ฉ๋‹ˆ๋‹ค.ํŒŒ์ผ๋ช…:๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk์‚ฌ์ด์ฆˆ:52 MBMD5:f6d72abf9ca654a20bbaf23ea1c10a55SHA-1:543e3b4b74257c3ffcd45dcdd8c842489a82bc07SHA-256:90bf1f20f962d04f8ae3f936d0f9046da28a75fa2fb37f267ff0453f272c60a0์ž…๋‹ˆ๋‹ค.์•…์„ฑ์ฝ”๋“œ PowerShell ์ฝ”๋“œStringData{ namestring: ..

๊ฟˆ์„๊พธ๋Š” ํŒŒ๋ž‘์ƒˆ
"Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)" published by Genians. #APT37, #LNK, #ToyBoxStory, #RokRAT, #DPRK, #CTI https://www.genians.co.kr/en/blog/threat_intelligence/toybox-story
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)

APT37 used Dropbox to spread ZIP files with malicious LNK files that filelessly executed RoKRAT and triggered extra malware with the keyword โ€˜toyโ€™.