Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware

Posted on July 24, 2025July 24, 2025 By CWS

Cybersecurity researchers have uncovered a classy malware marketing campaign the place risk actors are exploiting Hangul Phrase Processor (.hwp) paperwork to distribute the infamous RokRAT malware.

This marks a big shift from the malware’s conventional distribution methodology via malicious shortcut (LNK) information, demonstrating the evolving techniques of superior persistent risk teams.

The assault marketing campaign makes use of fastidiously crafted social engineering lures with doc names corresponding to “250615_Operation standing of grain retailer.hwp” and “[Notice] Q1 VAT Return Submitting Deadline (Ultimate)” to entice victims into opening malicious attachments.

Doc content material (Supply – ASEC)

These paperwork comprise seemingly reliable content material about North Korean grain distribution factors, successfully masking their malicious intent whereas constructing credibility with focused customers.

ASEC analysts recognized that the malware leverages a classy approach involving embedded OLE (Object Linking and Embedding) objects inside the HWP paperwork.

Hyperlink to execute ShallRunas.exe (Supply – ASEC)

When victims entry the doc web page containing these objects, the Hangul course of robotically creates malicious information together with ShellRunas.exe and credui.dll within the system’s short-term listing (%TEMP% path).

The assault chain concludes with victims clicking a hyperlink labeled “[Appendix] Reference Supplies.docx” on the doc’s backside, triggering a safety warning that prompts execution of the embedded malware parts.

DLL Facet-Loading Assault Mechanism

The malware employs a classy DLL side-loading techniqueables to bypass safety controls.

Shellcode inserted into the picture (Supply – ASEC)

The first assault vector makes use of ShellRunas.exe, a reliable Home windows utility, which robotically masses the malicious credui.dll from the identical listing path.

Authentic Program: ShellRunas.exe (Microsoft-signed)
Malicious Payload: credui.dll (loaded by way of DLL side-loading)
Ultimate Stage: Downloads Father.jpg containing RokRAT shellcode

This method permits risk actors to execute malicious code whereas showing to make use of trusted system parts, considerably complicating detection efforts and enabling the deployment of RokRAT’s complete knowledge assortment capabilities.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:.hwp, Actors, Deliver, Files, Malware, RokRAT, Threat, Weaponizing

Post navigation

Previous Post: Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
Next Post: CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing

Related Posts

Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Cyber Security News
Hackers Abusing GitHub Notifications to Deliver Phishing Emails Cyber Security News
New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials Cyber Security News
Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor Cyber Security News
Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Users Report Teams and Access Issues
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities
  • Microsoft Patches 57 Vulnerabilities, Three Zero-Days
  • Microsoft Names New Operating CISOs in Strategic Move to Strengthen Cyberdefense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Users Report Teams and Access Issues
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities
  • Microsoft Patches 57 Vulnerabilities, Three Zero-Days
  • Microsoft Names New Operating CISOs in Strategic Move to Strengthen Cyberdefense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark