Malware & RansomwareHIGH

APT37 Uses Facebook Social Engineering to Spread RokRAT, New Insights Revealed

Featured image for APT37 Uses Facebook Social Engineering to Spread RokRAT, New Insights Revealed
#APT37#RokRAT#social engineering#malware#North Korea#cybersecurity#Facebook#Malware#Threat Intelligence

Original Reporting

THThe Hacker News

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameRokRAT
Malware TypeRemote Access Trojan
Threat ActorAPT37
Target PlatformWindows
Delivery MethodSocial Engineering via Facebook and Telegram
Persistence MechanismMalicious software installation
C2 InfrastructureCompromised legitimate websites
CapabilitiesRemote command execution, screenshot capture, information gathering
IOCs AvailableFacebook accounts, compromised software
Detection RateLow
MITRE ATT&CKT1071.001 (Application Layer Protocol: Web Protocols)
🎯

APT37, a group of hackers from North Korea, tricks people on Facebook into thinking they are friends. They send fake files that look safe but actually install harmful software on the victim's computer, allowing the hackers to steal information without being noticed.

Quick Summary

APT37 has launched a new targeted intrusion campaign using social media and tampered software to spread RokRAT malware. Learn how they exploit trust and disguise malicious activities.

How It Works

APT37, also known as ScarCruft, has launched a targeted intrusion campaign that effectively utilizes social media platforms and encrypted messaging apps to compromise victims. The campaign begins with the creation of two Facebook accounts, 'richardmichael0828' and 'johnsonsophia0414', both registered on November 10, 2025, with locations set to Pyongyang and Pyongsong, North Korea. After sending friend requests to carefully selected targets, the attackers build trust through one-on-one conversations on Messenger, often discussing military weapons technology to establish a believable context.

Once genuine interest is established, the conversation shifts to Telegram, where the malicious content is delivered. The attackers employ a social engineering method known as pretexting, tricking victims into believing they need a special viewer to open encrypted military documents. This viewer is a tampered version of Wondershare PDFelement, disguised as a legitimate software installer.

Technical Details

The malicious installer is packaged within an encrypted ZIP archive named 'm.zip', alongside decoy military-themed PDFs and a fake user guide. Notably, the tampered installer lacks a valid digital signature, indicating it has been modified. The legitimate installer is named 'Wondershare_PDFelement_Installer.exe', while the malicious version is labeled 'Wondershare_PDFelement_Installer(PDF_Security).exe', designed to appear as a security-enhanced release.

Upon execution, the installer appears to run normally, but in the background, embedded shellcode is triggered, establishing a connection to the attacker's infrastructure. This connection routes commands through a compromised website associated with a Japanese real estate company, blending malicious activity with normal network traffic. The malware retrieves a second-stage payload disguised as a JPG image from the domain 'japanroom[.]com'.

Signs of Infection

Victims may not notice any immediate signs of infection, as the attack is designed to be stealthy. However, once compromised, the malware can exfiltrate sensitive data, including screenshots, documents in various formats, and audio recordings, to Zoho WorkDrive through hardcoded OAuth2 tokens, making the outbound traffic appear as ordinary cloud activity.

Defensive Measures

Organizations, especially those working with defense or government materials, should take proactive measures to mitigate risks. Key recommendations include:

  • Verifying digital signatures on all software installers before running them.
  • Avoiding installations from messaging platforms without confirming the official source.
  • Deploying endpoint detection solutions that flag abnormal child processes spawned by installers.
  • Monitoring for unexpected outbound connections to cloud services like Zoho WorkDrive.
  • Conducting regular security awareness training focused on social engineering attacks originating from social networks rather than email.

The sophistication of this campaign highlights the evolving tactics of APT37, which continues to refine its methods for delivering RokRAT while maintaining a focus on evasion and stealth.

πŸ” How to Check If You're Affected

  1. 1.Monitor for unusual outbound connections to cloud services.
  2. 2.Check for abnormal child processes spawned by installers.
  3. 3.Verify digital signatures on software before installation.
  4. 4.Educate users on recognizing social engineering tactics.

🏒 Impacted Sectors

GovernmentDefenseTechnology

Pro Insight

The use of social engineering tactics on platforms like Facebook and Telegram signifies a shift in how threat actors approach their targets, making traditional defenses less effective. Organizations must adapt their training and security measures accordingly.

πŸ—“οΈ Story Timeline

Story broke by The Hacker News
Covered by Cyber Security News

Sources

Original Report

THThe Hacker News
Read Original

Also covered by

CYCyber Security News

APT37 Abuses Facebook, Telegram, and Tampered Installer in New Targeted Intrusion Attack

Read

Related Pings

HIGHMalware & Ransomware

Magecart Campaign - Active Threat Targeting Ecommerce Sites

A Magecart campaign is stealthily targeting ecommerce sites with customized malware. This attack injects fake payment forms to steal sensitive card data. Stay vigilant and protect your online transactions.

Scott HelmeΒ·
HIGHMalware & Ransomware

JanelaRAT - New Financial Malware Targets Latin America

JanelaRAT is a new financial malware targeting users in Latin America. It exploits banking data through sophisticated tactics. Staying informed is key to protection.

Kaspersky SecurelistΒ·
HIGHMalware & Ransomware

Android Malware - Hijacks Google Gemini for Persistence

A new Android malware implant has been discovered using Google Gemini for persistence tasks. This poses a significant risk to Android users, especially those downloading apps from untrusted sources. Stay informed about the evolving tactics of malware developers.

Infosecurity MagazineΒ·
HIGHMalware & Ransomware

Advantest Faces Ransomware Attack - Incident Response Deployed

Advantest, a semiconductor testing specialist, has been hit by a ransomware attack. The company is now implementing incident response measures. This incident underscores the rising threat of ransomware in tech.

Infosecurity MagazineΒ·
HIGHMalware & Ransomware

Sophisticated Python Malware - Uncovered in Fraud Probe

A fraud investigation has revealed sophisticated Python malware with advanced obfuscation techniques. This poses significant risks to organizations, particularly in finance. Immediate action is needed to mitigate potential threats.

Infosecurity MagazineΒ·
HIGHMalware & Ransomware

AI-Poisoning - Evolved AMOS Stealer Threatens macOS Users

Hackers are exploiting AI trust to deliver the AMOS Stealer, targeting Mac users. This malware uses social engineering to bypass traditional defenses, posing significant risks. Stay informed and protect your devices from this evolving threat.

Huntress BlogΒ·