Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Exploits Cloud Services in New Malware Campaign

ScarCruft Exploits Cloud Services in New Malware Campaign

Posted on February 9, 2026 By CWS

ScarCruft’s New Tactics in Cyber Espionage

A North Korean-backed advanced persistent threat group, ScarCruft, is advancing its cyber espionage techniques in a recently discovered operation involving the distribution of the ROKRAT malware. This effort signifies a strategic departure from their previous methods, as they now employ Object Linking and Embedding (OLE) objects within Hangul Word Processor (HWP) documents for more sophisticated attacks.

Innovative Infection Techniques

ScarCruft’s shift in tactics is aimed at penetrating targeted systems with greater stealth. By executing the ROKRAT remote access trojan directly in memory, they aim to reduce detectable traces. The threat actors have also maintained their pattern of exploiting legitimate cloud services for command and control (C2) communications.

By integrating services like pCloud and Yandex, ScarCruft masks its malicious activities within regular network traffic, complicating detection and blocking for cybersecurity teams. This strategic usage of commercial cloud platforms allows the malware to consistently receive commands and payloads while evading network security measures.

Technical Analysis of ScarCruft’s Methods

In a recent analysis, S2W researchers identified shifts in ScarCruft’s delivery mechanisms, although the group’s technical signatures remain constant. The analysis showed distinct behaviors, including the use of ROR13-based API resolving and a specific 0x29 XOR key for decrypting payloads. These technical consistencies link the new OLE-based techniques to ScarCruft’s established toolset.

OLE-Based Injection and Evasion

The attack strategy focuses on embedding malicious Droppers and Loaders as OLE objects. When a compromised HWP document is accessed, these objects trigger the attack, often using DLL side-loading to disguise as legitimate processes and bypass security scans. For example, malicious files named mpr.dll or credui.dll are side-loaded into applications like ShellRunas.exe.

In some scenarios, the Dropper releases a payload from its resources, while in others, it serves as a downloader, obtaining shellcode hidden through steganography from Dropbox links. The Loader verifies the analysis environment before decrypting the payload with a 1-byte XOR key, ensuring ROKRAT operates surreptitiously in system memory.

Preventive Measures and Security Recommendations

To counter these threats, organizations must be vigilant with HWP documents received via phishing emails. As executing documents with harmful OLE objects can result in arbitrary code execution, security teams should avoid opening files from dubious sources. Enhancing threat detection capabilities to identify unusual OLE objects in HWP files is crucial.

Stay updated by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for immediate updates.

Cyber Security News Tags:cloud services, Cybersecurity, DLL side-loading, HWP documents, Malware, North Korean APT, OLE objects, phishing threats, RokRAT, ScarCruft

Post navigation

Previous Post: New Tool Exploits Windows Service Recovery for Cyber Attacks
Next Post: Spear-Phishing Campaign Targets Uzbekistan and Russia

Related Posts

New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data Cyber Security News
HackerOne Paid  In Bug Bounty With Emergence of Bionic Hackers HackerOne Paid $81 In Bug Bounty With Emergence of Bionic Hackers Cyber Security News
Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Cyber Security News
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News
Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026
  • Hackers Utilize DKIM Replay to Exploit Trusted Invoices
  • Ransomware Groups May Shift Back to Encryption Strategies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026
  • Hackers Utilize DKIM Replay to Exploit Trusted Invoices
  • Ransomware Groups May Shift Back to Encryption Strategies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark