Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Use Facebook to Spread Malware

North Korean Hackers Use Facebook to Spread Malware

Posted on April 13, 2026 By CWS

North Korean cyber actors, identified as APT37 or ScarCruft, are behind a new social engineering initiative using Facebook to deliver the RokRAT malware. This campaign involves creating trust with targeted individuals on the platform, turning these connections into avenues for malware distribution.

Social Engineering Tactics on Facebook

The attackers utilized Facebook profiles with locations set to Pyongyang and Pyongsong in North Korea to find potential victims. After initiating contact through friend requests, they transitioned conversations to Facebook Messenger, exploiting specific topics to enhance the credibility of their approach.

A central element of the strategy is pretexting, where the attackers deceived users into installing a compromised PDF viewer under the guise of accessing encrypted military documents. This viewer, a modified version of Wondershare PDFelement, executed concealed shellcode to establish an initial infection point.

Technical Breakdown and Evasion Strategies

The campaign cleverly employed legitimate but compromised online infrastructure for command-and-control operations. The attackers repurposed a website associated with a Japanese real estate service in Seoul to issue commands and dispatch payloads. The malware itself was disguised as an innocuous JPG image to evade detection.

Genians Security Center (GSC) highlighted this method as a sophisticated blend of software tampering, legitimate site misuse, and file extension deception, which collectively enhances the campaign’s evasive capabilities.

Execution and Payload Delivery

Details from the South Korean cybersecurity firm reveal the attackers created two Facebook accounts in November 2025. They eventually moved communications to Telegram, distributing a ZIP file containing the trojanized PDF software, multiple PDF files, and installation instructions.

The compromised installer executed encrypted shellcode, facilitating communication with a command server located at “japanroom[.]com.” This interaction enabled the download of a second-stage payload disguised as a JPG image, which ultimately delivered the RokRAT malware.

Malware Capabilities and Implications

RokRAT leverages Zoho WorkDrive as part of its command-and-control strategy, as previously noted in a campaign by Zscaler ThreatLabz. The malware is capable of capturing screenshots, executing commands, gathering host information, conducting reconnaissance, and bypassing security defenses like Qihoo’s 360 Total Security.

Despite its stable core functionality, RokRAT’s delivery and evasion methods continue to evolve, underscoring the persistent threat posed by North Korean cyber operations.

The Hacker News Tags:APT37, cyber attack, Cybersecurity, Facebook, Hackers, Malware, North Korea, RokRAT, social engineering, threat intelligence

Post navigation

Previous Post: Understanding SPF Flattening for Email Authentication
Next Post: Fake Claude Site Distributes RAT via Trojan Installer

Related Posts

What 2025 Is Teaching Us About Cloud Defense What 2025 Is Teaching Us About Cloud Defense The Hacker News
64% of 3rd-Party Applications Access Sensitive Data Without Justification 64% of 3rd-Party Applications Access Sensitive Data Without Justification The Hacker News
Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices The Hacker News
China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 The Hacker News
Exposure Assessment Platforms Signal a Shift in Focus Exposure Assessment Platforms Signal a Shift in Focus The Hacker News
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VIPERTUNNEL Backdoor Exploits Obfuscated Python Code
  • Global Operation Halts Major Cryptocurrency Theft Schemes
  • AI Advances Transform Cybersecurity Post-Alert Response
  • APT37 Exploits Social Media in New Cyber Attack
  • CPUID Website Breach Distributes Malicious Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VIPERTUNNEL Backdoor Exploits Obfuscated Python Code
  • Global Operation Halts Major Cryptocurrency Theft Schemes
  • AI Advances Transform Cybersecurity Post-Alert Response
  • APT37 Exploits Social Media in New Cyber Attack
  • CPUID Website Breach Distributes Malicious Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark