{"id":45355,"date":"2026-04-13T20:14:23","date_gmt":"2026-04-13T12:14:23","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/13\/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware\/"},"modified":"2026-04-13T20:14:23","modified_gmt":"2026-04-13T12:14:23","slug":"north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/13\/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware\/","title":{"rendered":"North Korea&#8217;s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhm-HTAVB66ntSv8R4Bgh9szlrPPh6ah0eJGTDheDntj2w9bW9XzWcgs2CAGsN_C8DS7T4M7V8q18_DtgMZu3mJONEewq_oWlpefdtwp6BgudRjw2Z68jXoP8tHCdxSyvZ-xvVuPlh-xpxEeIRHk1v2mq5KqZxS1z316ncG5j2Q9HQe_bJhIJE4XWONvyYL\/s1600\/telegram.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhm-HTAVB66ntSv8R4Bgh9szlrPPh6ah0eJGTDheDntj2w9bW9XzWcgs2CAGsN_C8DS7T4M7V8q18_DtgMZu3mJONEewq_oWlpefdtwp6BgudRjw2Z68jXoP8tHCdxSyvZ-xvVuPlh-xpxEeIRHk1v2mq5KqZxS1z316ncG5j2Q9HQe_bJhIJE4XWONvyYL\/s1600\/telegram.jpg\" alt=\"North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware\"\/><\/a><\/div>\n<p>The North Korean hacking group tracked&nbsp;as <a href=\"https:\/\/thehackernews.com\/2025\/09\/scarcruft-uses-rokrat-malware-in.html\">APT37<\/a> (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan&nbsp;called <a href=\"https:\/\/thehackernews.com\/2024\/01\/north-korean-hackers-weaponize-fake.html\">RokRAT<\/a>.<\/p>\n<p>&#8220;The threat actor used two Facebook accounts with their location set to Pyongyang&nbsp;and Pyongsong, North Korea, to identify and screen targets,&#8221; the Genians Security Center&nbsp;(GSC) <a href=\"https:\/\/www.genians.co.kr\/en\/blog\/threat_intelligence\/pretexting\">said<\/a> in a technical breakdown of the campaign. &#8220;After building trust through friend requests, the actor moved the conversation to Messenger and used specific topics to lure targets as part of the initial social engineering stage of the&nbsp;attack.&#8221;<\/p>\n<p>Central to the attack is the use of what the GSC describes as pretexting, a tactic where the threat actors aim to trick unsuspecting users into installing a dedicated PDF viewer, claiming the software was necessary to open encrypted military documents. The&nbsp;PDF viewer used in the infection chain is a tampered version of Wondershare PDFelement, which, when launched, triggers the execution of embedded shellcode that allows the attackers to obtain an initial&nbsp;foothold.<\/p>\n<p>Another significant aspect of the campaign is that it utilizes legitimate but compromised infrastructure for command-and-control (C2), weaponizing the website associated with the Seoul arm of a Japanese real estate information service to issue malicious commands and payloads. What&#8217;s more, the payload takes the form of a seemingly harmless JPG image to deliver&nbsp;RokRAT.<\/p>\n<p>&#8220;This is assessed as a highly evasive strategy that combines legitimate software tampering, abuse of a legitimate website, and file extension masquerading,&#8221; the GSC&nbsp;said.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWchkR_RFkav7q3PRymFcRSWXefFD7VRfgnbSRTRBmpbOYUYiA50lgNTF9rAQhyphenhyphenci5OSDVxuNaiSvogjOFFRIsaOxL76SlCVNV6XmWmsoAs-4Evdzh_kZb8FKWpEvzBj91gHIQwRhhpHjuJELUd7jB7SXlmqNi7X33_GgMK6pJ9oskE2GwPJCKfRM2eX6V\/s1600\/flow.png\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"1625\" data-original-width=\"2600\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWchkR_RFkav7q3PRymFcRSWXefFD7VRfgnbSRTRBmpbOYUYiA50lgNTF9rAQhyphenhyphenci5OSDVxuNaiSvogjOFFRIsaOxL76SlCVNV6XmWmsoAs-4Evdzh_kZb8FKWpEvzBj91gHIQwRhhpHjuJELUd7jB7SXlmqNi7X33_GgMK6pJ9oskE2GwPJCKfRM2eX6V\/s1600\/flow.png\" alt=\"North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware\"\/><\/a><\/div>\n<p>In the attack sequence detailed by the South Korean cybersecurity company, the threat actors have been found to create two Facebook accounts &#8212; &#8220;richardmichael0828&#8221; and &#8220;johnsonsophia0414,&#8221; both of which were created on November 10, 2025 &#8212; and deliver a ZIP file after moving the conversation to Telegram, with the archive containing the trojanized version of Wondershare PDFelement along with four PDF documents and a text file containing instructions to install the program to view the&nbsp;PDFs.<\/p>\n<p>The encrypted shellcode executed after the launch of the tampered installer allows it to establish communication with the C2 server (&#8220;japanroom[.]com&#8221;) and download a second-stage payload, a JPG image (&#8220;1288247428101.jpg&#8221;) that&#8217;s then used to final RokRAT&nbsp;payload.<\/p>\n<p>The malware, for its part, abuses Zoho WorkDrive as C2 &#8211; a tactic&nbsp;also <a href=\"https:\/\/thehackernews.com\/2026\/02\/scarcruft-uses-zoho-workdrive-and-usb.html\">detailed<\/a> by Zscaler ThreatLabz in February 2026 as part of a campaign codenamed Ruby Jumper &#8211; enabling it to capture screenshots, enable remote command execution via &#8220;cmd.exe,&#8221; collect host information, perform system reconnaissance, and evade detection by security programs like Qihoo&#8217;s 360 Total Security, while disguising malicious&nbsp;traffic.<\/p>\n<p>&#8220;Its core functionality has remained relatively stable and has been reused repeatedly across multiple operations over time,&#8221; the GSC said. &#8220;This shows that RokRAT has focused less on changing its core functionality and more on evolving its delivery, execution, and evasion&nbsp;chain.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The North Korean hacking group tracked&nbsp;as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan&nbsp;called RokRAT.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45355","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45355"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45355\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}