Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

Posted on September 1, 2025September 1, 2025 By CWS

Cybersecurity researchers have found a brand new phishing marketing campaign undertaken by the North Korea-linked hacking group known as ScarCruft (aka APT37) to ship a malware often known as RokRAT.
The exercise has been codenamed Operation HanKook Phantom by Seqrite Labs, stating the assaults seem to focus on people related to the Nationwide Intelligence Analysis Affiliation, together with educational figures, former authorities officers, and researchers.
“The attackers possible goal to steal delicate info, set up persistence, or conduct espionage,” safety researcher Dixit Panchal mentioned in a report printed final week.
The start line of the assault chain is a spear-phishing e-mail containing a lure for “Nationwide Intelligence Analysis Society Publication—Situation 52,” a periodic publication issued by a South Korean analysis group centered on nationwide intelligence, labour relations, safety, and power points.

The digital missive comprises a ZIP archive attachment that comprises a Home windows shortcut (LNK) masquerading as a PDF doc, which, when opened, launches the publication as a decoy whereas dropping RokRAT on the contaminated host.
RokRAT is a recognized malware related to APT37, with the software able to amassing system info, executing arbitrary instructions, enumerating the file system, capturing screenshots, and downloading extra payloads. The gathered information is exfiltrated through Dropbox, Google Cloud, pCloud, and Yandex Cloud.
Seqrite mentioned it detected a second marketing campaign during which the LNK file serves as a conduit for a PowerShell script that, in addition to dropping a decoy Microsoft Phrase doc, runs an obfuscated Home windows batch script that is accountable for deploying a dropper. The binary then runs a next-stage payload to steal delicate information from the compromised host whereas concealing community site visitors as a Chrome file add.
The lure doc used on this occasion is a press release issued by Kim Yo Jong, the Deputy Director of the Publicity and Info Division of the Staff’ Occasion of Korea and, dated July 28, rejecting Seoul’s efforts at reconciliation.
“The evaluation of this marketing campaign highlights how APT37 (ScarCruft/InkySquid) continues to make use of extremely tailor-made spear-phishing assaults, leveraging malicious LNK loaders, fileless PowerShell execution, and covert exfiltration mechanisms,” Panchal mentioned.

“The attackers particularly goal South Korean authorities sectors, analysis establishments, and lecturers with the target of intelligence gathering and long-term espionage.”
The event comes as cybersecurity firm QiAnXin detailed assaults mounted by the notorious Lazarus Group (aka QiAnXin) utilizing ClickFix-style techniques to trick job seekers into downloading a supposed NVIDIA-related replace to handle digicam or microphone points when offering a video evaluation. Particulars of this exercise had been beforehand disclosed by Gen Digital in late July 2025.
The ClickFix assault leads to the execution of a Visible Fundamental Script that results in the deployment of BeaverTail, a JavaScript stealer that may additionally ship a Python-based backdoor dubbed InvisibleFerret. Moreover, the assaults pave the best way for a backdoor with command execution and file learn/write capabilities.
The disclosure additionally follows new sanctions imposed by the U.S. Division of the Treasury’s Workplace of Overseas Belongings Management (OFAC) towards two people and two entities for his or her function within the North Korean distant info know-how (IT) employee scheme to generate illicit income for the regime’s weapons of mass destruction and ballistic missile packages.
The Chollima Group, in a report launched final week, detailed its investigation into an IT Employee cluster affiliated with Moonstone Sleet that it tracks as BABYLONGROUP in reference to a blockchain play-to-earn (P2E) recreation known as DefiTankLand.

It is assessed that Logan King, the supposed CTO of DefiTankLand, is definitely a North Korean IT Employee, a speculation bolstered by the truth that King’s GitHub account has been used as a reference by a Ukrainian freelancer and blockchain developer named “Ivan Kovch.”
“Many members had beforehand labored on an enormous cryptocurrency mission on behalf of a shady firm known as ICICB (who we imagine to be a entrance), that one of many non-DPRK members of the cluster runs the Chinese language cybercrime market FreeCity, and an attention-grabbing connection between DeTankZone and an older IT Employee who beforehand operated out of Tanzania,” the Chollima Group mentioned.
“Whereas the DefiTankLand CEO Nabil Amrani has labored beforehand with Logan on different blockchain tasks, we don’t imagine he’s accountable for any of the event. This all signifies that the “reliable” recreation behind Moonstone Sleet’s DeTankZone was in reality developed by DPRK IT Staff, solely to be later picked up and utilized by a North Korean APT Group.”

The Hacker News Tags:Academics, HanKook, Korean, Malware, Operation, Phantom, RokRAT, ScarCruft, South, Targeting

Post navigation

Previous Post: Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users
Next Post: Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution

Related Posts

Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally The Hacker News
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution
  • ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
  • Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users
  • CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
  • How Prompt Injection Attacks Bypassing AI Agents With Users Input

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution
  • ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
  • Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users
  • CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
  • How Prompt Injection Attacks Bypassing AI Agents With Users Input

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News