Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware

Posted on July 24, 2025July 24, 2025 By CWS

Cybersecurity researchers have uncovered a classy malware marketing campaign the place risk actors are exploiting Hangul Phrase Processor (.hwp) paperwork to distribute the infamous RokRAT malware.

This marks a big shift from the malware’s conventional distribution methodology via malicious shortcut (LNK) information, demonstrating the evolving techniques of superior persistent risk teams.

The assault marketing campaign makes use of fastidiously crafted social engineering lures with doc names corresponding to “250615_Operation standing of grain retailer.hwp” and “[Notice] Q1 VAT Return Submitting Deadline (Ultimate)” to entice victims into opening malicious attachments.

Doc content material (Supply – ASEC)

These paperwork comprise seemingly reliable content material about North Korean grain distribution factors, successfully masking their malicious intent whereas constructing credibility with focused customers.

ASEC analysts recognized that the malware leverages a classy approach involving embedded OLE (Object Linking and Embedding) objects inside the HWP paperwork.

Hyperlink to execute ShallRunas.exe (Supply – ASEC)

When victims entry the doc web page containing these objects, the Hangul course of robotically creates malicious information together with ShellRunas.exe and credui.dll within the system’s short-term listing (%TEMP% path).

The assault chain concludes with victims clicking a hyperlink labeled “[Appendix] Reference Supplies.docx” on the doc’s backside, triggering a safety warning that prompts execution of the embedded malware parts.

DLL Facet-Loading Assault Mechanism

The malware employs a classy DLL side-loading techniqueables to bypass safety controls.

Shellcode inserted into the picture (Supply – ASEC)

The first assault vector makes use of ShellRunas.exe, a reliable Home windows utility, which robotically masses the malicious credui.dll from the identical listing path.

Authentic Program: ShellRunas.exe (Microsoft-signed)
Malicious Payload: credui.dll (loaded by way of DLL side-loading)
Ultimate Stage: Downloads Father.jpg containing RokRAT shellcode

This method permits risk actors to execute malicious code whereas showing to make use of trusted system parts, considerably complicating detection efforts and enabling the deployment of RokRAT’s complete knowledge assortment capabilities.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:.hwp, Actors, Deliver, Files, Malware, RokRAT, Threat, Weaponizing

Post navigation

Previous Post: Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
Next Post: CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing

Related Posts

Multiple Vulnerabilities in Tridium Niagara Framework Cyber Security News
Implementing NIST CSF 2.0 A Technical Blueprint Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads Cyber Security News
Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025 Cyber Security News
ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News
20-Year-Old Vulnerability Allows Hackers to Control Train Brakes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm
  • Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files
  • 15 Best Bandwidth Monitoring Tools in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm
  • Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files
  • 15 Best Bandwidth Monitoring Tools in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News