Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File

Posted on August 4, 2025August 4, 2025 By CWS

A classy new wave of cyberattacks attributed to North Korea’s infamous APT37 (Reaper) group is leveraging superior malware hidden inside JPEG picture information to compromise Microsoft Home windows methods, signaling a harmful evolution in evasion techniques and fileless assault methods.

Safety researchers at Genians Safety Middle (GSC) not too long ago recognized a brand new variant of the notorious RoKRAT malware utilized by APT37. In contrast to earlier variations, this variant employs an intricate two-stage shellcode injection course of designed to hinder forensic evaluation and bypass conventional safety controls.

Of explicit concern is the group’s use of steganography: malicious code is hid inside what seem like innocuous picture information, making detection exponentially tougher for endpoint defenses.

APT37’s Enhanced RoKRAT Malware An infection Course of

The present marketing campaign, noticed primarily in South Korea, is distributed by way of compressed archives (e.g., “Nationwide Intelligence and Counterintelligence Manuscript.zip”) containing enormous Home windows shortcut (.lnk) information. These shortcuts embed a number of hidden parts, together with:

A reputable decoy doc.

Shellcode and script information.

PowerShell instructions are designed to decrypt and execute additional payloads.

By exploiting person belief in seemingly routine information, particularly these hooked up to emails or on the spot messages, APT37 maximizes the chance of profitable compromise.

Assault Chain

As soon as initiated, this multi-stage chain executes a batch script that launches PowerShell. The script decodes an encrypted shellcode payload utilizing XOR operations, in the end injecting the malicious code into trusted Home windows processes comparable to mspaint.exe or notepad.exe.

This fileless method leaves minimal forensic traces, permitting menace actors to evade each signature-based antivirus and lots of heuristic options.

In a serious leap ahead, the malware leverages steganography by embedding RoKRAT modules inside JPEG information distributed by way of cloud storage suppliers like Dropbox and Yandex.

For instance, “Father.jpg” accommodates legitimate picture information, however cautious evaluation reveals encrypted shellcode hid alongside normal photograph content material.

The malware extracts the JPEG useful resource and, after a collection of XOR decoding steps, reveals and executes the hidden RoKRAT malware, all whereas bypassing standard file-based detection methods.

RoKRAT continues to exfiltrate info paperwork, screenshots, and session information from contaminated endpoints by abusing reputable cloud APIs for C2 communication.

The usage of real cloud tokens and registered accounts additional muddies attribution and frustrates defenders searching for suspicious site visitors patterns.

APT37’s technical agility is seen in its switching of injection targets (from mspaint.exe to notepad.exe as Home windows evolves) and the cautious camouflage of developer artifacts like PDB paths and toolchain names (e.g., “InjectShellcode” and “Weapon”).

Cloud accounts attributed to the attackers are linked to Yandex e-mail addresses and pseudonymous social media profiles, complicating monitoring efforts.

This marketing campaign highlights the rising necessity for safety groups to implement superior Endpoint Detection and Response (EDR) options targeted on behavioral monitoring fairly than counting on signatures or static guidelines.

Common person consciousness coaching, strict endpoint administration, and proactive monitoring of cloud service site visitors are actually important arms within the struggle in opposition to state-sponsored threats.

Genians’ report underscores that as menace actors refine their methods, particularly by way of steganography and fileless strategies, proactive, adaptive protection methods should hold tempo to mitigate these evolving dangers.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:APT37, Attack, File, Files, Hackers, JPEG, Leveraging, mspaint.exe, System, Weaponizes, Windows

Post navigation

Previous Post: How to Secure a NAS (Network Attached Storage)
Next Post: PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Related Posts

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
  • The Wild West of Shadow IT
  • AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
  • NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine
  • Several Vulnerabilities Patched in AI Code Editor Cursor 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
  • The Wild West of Shadow IT
  • AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
  • NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine
  • Several Vulnerabilities Patched in AI Code Editor Cursor 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News