Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware

Posted on July 24, 2025July 24, 2025 By CWS

Cybersecurity researchers have uncovered a classy malware marketing campaign the place risk actors are exploiting Hangul Phrase Processor (.hwp) paperwork to distribute the infamous RokRAT malware.

This marks a big shift from the malware’s conventional distribution methodology via malicious shortcut (LNK) information, demonstrating the evolving techniques of superior persistent risk teams.

The assault marketing campaign makes use of fastidiously crafted social engineering lures with doc names corresponding to “250615_Operation standing of grain retailer.hwp” and “[Notice] Q1 VAT Return Submitting Deadline (Ultimate)” to entice victims into opening malicious attachments.

Doc content material (Supply – ASEC)

These paperwork comprise seemingly reliable content material about North Korean grain distribution factors, successfully masking their malicious intent whereas constructing credibility with focused customers.

ASEC analysts recognized that the malware leverages a classy approach involving embedded OLE (Object Linking and Embedding) objects inside the HWP paperwork.

Hyperlink to execute ShallRunas.exe (Supply – ASEC)

When victims entry the doc web page containing these objects, the Hangul course of robotically creates malicious information together with ShellRunas.exe and credui.dll within the system’s short-term listing (%TEMP% path).

The assault chain concludes with victims clicking a hyperlink labeled “[Appendix] Reference Supplies.docx” on the doc’s backside, triggering a safety warning that prompts execution of the embedded malware parts.

DLL Facet-Loading Assault Mechanism

The malware employs a classy DLL side-loading techniqueables to bypass safety controls.

Shellcode inserted into the picture (Supply – ASEC)

The first assault vector makes use of ShellRunas.exe, a reliable Home windows utility, which robotically masses the malicious credui.dll from the identical listing path.

Authentic Program: ShellRunas.exe (Microsoft-signed)
Malicious Payload: credui.dll (loaded by way of DLL side-loading)
Ultimate Stage: Downloads Father.jpg containing RokRAT shellcode

This method permits risk actors to execute malicious code whereas showing to make use of trusted system parts, considerably complicating detection efforts and enabling the deployment of RokRAT’s complete knowledge assortment capabilities.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:.hwp, Actors, Deliver, Files, Malware, RokRAT, Threat, Weaponizing

Post navigation

Previous Post: Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
Next Post: CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing

Related Posts

NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support Cyber Security News
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News
Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
  • New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts
  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
  • New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts
  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News