Saturday, April 27, 2024

North Korean APT37 Hackers Use VBA Self Decode Technique to Inject RokRat

A North Korean hacking group known as ScarCruft, Reaper and Group123 has been involved in targeting the South Korean government by using a VBA self-decode technique to inject RokRat.

What is RokRat?

RokRat is a Remote Access Trojan(RAT) and is a sophisticated backdoor commonly distributed as an encoded binary file, downloaded and decrypted by shellcode following the exploitation of weaponized documents. RokRat is skilled at evasion and utilizes multiple techniques to make detection difficult and time-consuming.

The Attack History

On December 7, 2020, a malicious document uploaded to Virus Total was identified. The document pretended to be a meeting request, and it is believed the intended target of the attack was the South Korean government. 23 January 2020 is the meeting date mentioned in the document and this aligns with the document compilation date of 27 January 2020. This shows that the attack had taken place a year back.

The Interesting way how RokRat Attack Works

An embedded macro is contained in the malicious file, and this uses a VBA self-decoding technique to decode itself within memory spaces of Microsoft Office without writing to the disk. Once this is done, it then embeds a variant of the RokRat to Notepad.

Researchers believed that this sample is associated with APT37, a suspected North Korean cyber espionage group, basis the injected payload.  In the past, this APT has relied on Hangul Office documents (hwp files) to target victims, as it’s software that’s commonly used in South Korea.

Spear phishing was the primary initial infection vector used by APT37. An email is sent to the target to weaponize the malicious document.

Spear Phishing is a malicious practice that execute via Email campaigns that hackers research their target audience, understand their likes and dislikes, study their day to day operations, and customize the mail to steal the sensitive data and install malware.

Usually Hwp files (Hangul Office) are used to weaponize with a self-decode macro. However, this time Microsoft Office file have been used. In the past too, the RokRat malware has targeted several high profile public figures including Donald Trump, Hillary Clinton and several others.

This attack was carried out for political purposes. In this campaign, the malware was delivered via malspam email campaigns with fake body content relating to bank frauds.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Also Read

U.S. Govt Released Advisory on how Iranian APT Group Obtained Voter Registration Data

APT‑C‑23 Hacker Group Attacks Android Users That Records Calls & Take Pictures Silently

Website

Latest articles

NETGEAR buffer Overflow Vulnerability Let Attackers Bypass Authentication

Some router models have identified a security vulnerability that allows attackers to bypass authentication.To...

5000+ CrushFTP Servers Hacked Using Zero-Day Exploit

Hackers often target CrushFTP servers as they contain sensitive data and are used for...

13,142,840 DDoS Attacks Targeted Organization Around The Globe

DDoS attacks are a significant and growing risk that can overpower websites, crash servers,...

Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike

Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt...

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one...

New SSLoad Malware Combined With Tools Hijacking Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which...

Palo Alto Networks Shares Remediation Advice for Hacked Firewalls

Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles