CybersecurityNewswireTechnology

North Korean Hackers Exploit Seoul Intelligence Files

Get Hired 3x Faster with AI- Powered CVs CV Assistant single post Ad
▼ Summary

– APT37, a North Korean-backed hacking group, conducted a large-scale spear-phishing campaign targeting South Korean government and intelligence staff.
– The first campaign used a legitimate-looking National Intelligence Research Society newsletter as a decoy to distribute a malicious LNK file.
– The second campaign exploited a statement by North Korean official Kim Yō-jong to deploy similar malicious techniques, including fileless attacks and data exfiltration.
– Both campaigns delivered the RokRAT backdoor and employed advanced evasion methods like in-memory execution and traffic blending to avoid detection.
– The operation demonstrates APT37’s continued use of highly tailored spear-phishing attacks against South Korean institutions and expanded global targets.

A sophisticated spear-phishing operation has targeted South Korean intelligence and government personnel using deceptively authentic documents as bait. Cybersecurity experts at Seqrite identified this campaign, attributing it to APT37, a hacking collective with strong links to North Korea. Dubbed Operation HanKook Phantom, the attack unfolded in two distinct phases, each designed to infiltrate high-value targets through carefully crafted lures.

The initial wave exploited a trusted internal publication, the National Intelligence Research Society Newsletter. Attackers distributed a malicious Windows shortcut file disguised as the newsletter’s 52nd issue. When opened, the file triggered a hidden payload, deploying RokRAT malware to seize control of the compromised system. This backdoor allowed unauthorized access while employing advanced evasion tactics like in-memory execution and covert data extraction.

Recipients of the newsletter, typically affiliated with institutions such as the National Intelligence Research Association, Kwangwoon University, and the Institute for National Security Strategy, were among the primary targets. The attackers leveraged the newsletter’s legitimate appearance to bypass suspicion, knowing its contents would attract precisely the audience they sought to compromise.

A second campaign utilized a provocative public statement from Kim Yŏ-jong, a high-ranking North Korean official, as bait. The document, which rejected inter-Korean dialogue, was paired with a malicious LNK file that initiated a multi-stage intrusion. Once executed, the attack deployed obfuscated scripts, employed fileless techniques via PowerShell, and exfiltrated sensitive data using disguised network traffic. Targets in this phase included the South Korean cabinet, the Ministry of Unification, and international bodies like APEC.

APT37, also known as ScarCruft or InkySquid, has operated since at least 2012 with a clear focus on espionage against South Korean interests. The group has gradually expanded its reach to include Japan, Vietnam, and various industrial sectors. Their methods reflect a persistent and evolving threat, combining social engineering with technical sophistication to bypass defenses.

This operation underscores the continued use of highly tailored spear-phishing tactics by state-sponsored actors. By blending familiar content with advanced malware, APT37 demonstrates a concerning ability to penetrate secure networks and maintain persistent access.

(Source: InfoSecurity)

Topics

spear phishing 95% apt37 group 93% operation hankook 90% rokrat backdoor 88% lnk files 87% fileless attacks 86% payload obfuscation 85% command control 84% data exfiltration 83% south korean targets 82%

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.