Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Exploits Cloud Services in New Malware Campaign

ScarCruft Exploits Cloud Services in New Malware Campaign

Posted on February 9, 2026 By CWS

ScarCruft’s New Tactics in Cyber Espionage

A North Korean-backed advanced persistent threat group, ScarCruft, is advancing its cyber espionage techniques in a recently discovered operation involving the distribution of the ROKRAT malware. This effort signifies a strategic departure from their previous methods, as they now employ Object Linking and Embedding (OLE) objects within Hangul Word Processor (HWP) documents for more sophisticated attacks.

Innovative Infection Techniques

ScarCruft’s shift in tactics is aimed at penetrating targeted systems with greater stealth. By executing the ROKRAT remote access trojan directly in memory, they aim to reduce detectable traces. The threat actors have also maintained their pattern of exploiting legitimate cloud services for command and control (C2) communications.

By integrating services like pCloud and Yandex, ScarCruft masks its malicious activities within regular network traffic, complicating detection and blocking for cybersecurity teams. This strategic usage of commercial cloud platforms allows the malware to consistently receive commands and payloads while evading network security measures.

Technical Analysis of ScarCruft’s Methods

In a recent analysis, S2W researchers identified shifts in ScarCruft’s delivery mechanisms, although the group’s technical signatures remain constant. The analysis showed distinct behaviors, including the use of ROR13-based API resolving and a specific 0x29 XOR key for decrypting payloads. These technical consistencies link the new OLE-based techniques to ScarCruft’s established toolset.

OLE-Based Injection and Evasion

The attack strategy focuses on embedding malicious Droppers and Loaders as OLE objects. When a compromised HWP document is accessed, these objects trigger the attack, often using DLL side-loading to disguise as legitimate processes and bypass security scans. For example, malicious files named mpr.dll or credui.dll are side-loaded into applications like ShellRunas.exe.

In some scenarios, the Dropper releases a payload from its resources, while in others, it serves as a downloader, obtaining shellcode hidden through steganography from Dropbox links. The Loader verifies the analysis environment before decrypting the payload with a 1-byte XOR key, ensuring ROKRAT operates surreptitiously in system memory.

Preventive Measures and Security Recommendations

To counter these threats, organizations must be vigilant with HWP documents received via phishing emails. As executing documents with harmful OLE objects can result in arbitrary code execution, security teams should avoid opening files from dubious sources. Enhancing threat detection capabilities to identify unusual OLE objects in HWP files is crucial.

Stay updated by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for immediate updates.

Cyber Security News Tags:cloud services, Cybersecurity, DLL side-loading, HWP documents, Malware, North Korean APT, OLE objects, phishing threats, RokRAT, ScarCruft

Post navigation

Previous Post: New Tool Exploits Windows Service Recovery for Cyber Attacks
Next Post: Spear-Phishing Campaign Targets Uzbekistan and Russia

Related Posts

Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints Cyber Security News
Developers Frustrated by ‘No Server Available’ Message Developers Frustrated by ‘No Server Available’ Message Cyber Security News
Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Cyber Security News
VirtualBox 7.2.2 Released With Fix For GUI Crashes On Virtual Machines (guests) VirtualBox 7.2.2 Released With Fix For GUI Crashes On Virtual Machines (guests) Cyber Security News
JanaWare Ransomware Targets Turkish Users with Adwind RAT JanaWare Ransomware Targets Turkish Users with Adwind RAT Cyber Security News
Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark