Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Exploits Cloud Services in New Malware Campaign

ScarCruft Exploits Cloud Services in New Malware Campaign

Posted on February 9, 2026 By CWS

ScarCruft’s New Tactics in Cyber Espionage

A North Korean-backed advanced persistent threat group, ScarCruft, is advancing its cyber espionage techniques in a recently discovered operation involving the distribution of the ROKRAT malware. This effort signifies a strategic departure from their previous methods, as they now employ Object Linking and Embedding (OLE) objects within Hangul Word Processor (HWP) documents for more sophisticated attacks.

Innovative Infection Techniques

ScarCruft’s shift in tactics is aimed at penetrating targeted systems with greater stealth. By executing the ROKRAT remote access trojan directly in memory, they aim to reduce detectable traces. The threat actors have also maintained their pattern of exploiting legitimate cloud services for command and control (C2) communications.

By integrating services like pCloud and Yandex, ScarCruft masks its malicious activities within regular network traffic, complicating detection and blocking for cybersecurity teams. This strategic usage of commercial cloud platforms allows the malware to consistently receive commands and payloads while evading network security measures.

Technical Analysis of ScarCruft’s Methods

In a recent analysis, S2W researchers identified shifts in ScarCruft’s delivery mechanisms, although the group’s technical signatures remain constant. The analysis showed distinct behaviors, including the use of ROR13-based API resolving and a specific 0x29 XOR key for decrypting payloads. These technical consistencies link the new OLE-based techniques to ScarCruft’s established toolset.

OLE-Based Injection and Evasion

The attack strategy focuses on embedding malicious Droppers and Loaders as OLE objects. When a compromised HWP document is accessed, these objects trigger the attack, often using DLL side-loading to disguise as legitimate processes and bypass security scans. For example, malicious files named mpr.dll or credui.dll are side-loaded into applications like ShellRunas.exe.

In some scenarios, the Dropper releases a payload from its resources, while in others, it serves as a downloader, obtaining shellcode hidden through steganography from Dropbox links. The Loader verifies the analysis environment before decrypting the payload with a 1-byte XOR key, ensuring ROKRAT operates surreptitiously in system memory.

Preventive Measures and Security Recommendations

To counter these threats, organizations must be vigilant with HWP documents received via phishing emails. As executing documents with harmful OLE objects can result in arbitrary code execution, security teams should avoid opening files from dubious sources. Enhancing threat detection capabilities to identify unusual OLE objects in HWP files is crucial.

Stay updated by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for immediate updates.

Cyber Security News Tags:cloud services, Cybersecurity, DLL side-loading, HWP documents, Malware, North Korean APT, OLE objects, phishing threats, RokRAT, ScarCruft

Post navigation

Previous Post: New Tool Exploits Windows Service Recovery for Cyber Attacks
Next Post: Spear-Phishing Campaign Targets Uzbekistan and Russia

Related Posts

Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Cyber Security News
Microsoft Urges OEM Manufacturers to Fix Windows 11 USB-C Notification Issues Microsoft Urges OEM Manufacturers to Fix Windows 11 USB-C Notification Issues Cyber Security News
5 New Trends In Phishing Attacks On Businesses  5 New Trends In Phishing Attacks On Businesses  Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
Chrome Security Update Patches Critical Remote Code Execution Vulnerability Chrome Security Update Patches Critical Remote Code Execution Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
  • New 0-Click Vulnerability Threatens Claude Desktop Users
  • Outtake Secures $40M to Enhance AI Cybersecurity Solutions
  • CISOs Tackle Burnout and Reduce MTTR Without Extra Staff
  • Microsoft Exchange Online Misidentifies Emails as Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
  • New 0-Click Vulnerability Threatens Claude Desktop Users
  • Outtake Secures $40M to Enhance AI Cybersecurity Solutions
  • CISOs Tackle Burnout and Reduce MTTR Without Extra Staff
  • Microsoft Exchange Online Misidentifies Emails as Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark