Skip to content

North Korea's APT37 Launches New ScarCruft Campaign Using LNK File and RokRAT Malware

APT37's new ScarCruft campaign targets South Korean government sectors and research institutions. The operation uses a malicious LNK file and decoy Word document to deploy RokRAT malware, highlighting the group's adaptability and persistence.

In the picture we can see three boys standing near the desk on it, we can see two computer systems...
In the picture we can see three boys standing near the desk on it, we can see two computer systems towards them and one boy is talking into the microphone and they are in ID cards with red tags to it and behind them we can see a wall with an advertisement board and written on it as Russia imagine 2013.

North Korea's APT37 Launches New ScarCruft Campaign Using LNK File and RokRAT Malware

Cybersecurity researchers at Seqrite Labs have exposed a fresh wave of the ScarCruft campaign. This time, the North Korea-linked APT37 group is using a malicious LNK file and a decoy Word document to steal sensitive data. The operation, dubbed HanKook Phantom, is targeting South Korean government sectors and research institutions. The campaign begins with a phishing email containing a fake newsletter PDF and a disguised malicious LNK file. When the LNK file is clicked, it triggers a multi-stage infection, ultimately deploying the RokRAT malware. This malware allows attackers to capture screenshots, support remote execution, and communicate with command and control (C2) servers through cloud services like Dropbox, pCloud, and Yandex. The goal is clear: data theft, persistence, and espionage. APT37, also known as ScarCruft, InkySquid, or Ricochet Chollima, has been active since at least 2012. They have previously exploited zero-day vulnerabilities in Adobe Flash Player. Kaspersky first documented their operations in 2016, noting attacks mainly targeting South Korean organizations. Seqrite Labs' discovery of the second ScarCruft campaign highlights the ongoing threat posed by APT37. Their use of a malicious LNK file and decoy Word document demonstrates the group's adaptability and persistence. With a focus on South Korean government sectors and research institutions, the HanKook Phantom operation underscores the need for robust cybersecurity measures to protect sensitive data.

Read also:

Latest