#APT37

2025-11-11

South Korean researchers (Genians) report that APT37 is abusing Google Find Hub to track victims and remotely wipe Android devices.

The attackers use phished Google credentials to access legitimate Find Hub functions - no exploit involved.

Google has confirmed this and advises enabling 2-Step Verification or passkeys.

Credential security remains the weakest link in most modern attacks.

#CyberSecurity #APT37 #GoogleFindHub #ThreatIntel #AndroidSecurity #InfoSec #MalwareAnalysis #Kimsuky #TechNadu

APT37 hackers abuse Google Find Hub in Android data-wiping attacks
2025-11-11

North Korean hackers are using Googleโ€™s own tools to remotely wipe Android devices and hijack messaging apps. Think your account is safe? Dive into how a single breach can trigger a digital meltdown.

thedefendopsdiaries.com/konni-

#konni
#apt37
#cyberespionage
#androidsecurity
#googlefindhub
#malware
#northkorea
#spearphishing
#infosec

2025-09-01

ScarCruft (APT37) is running Operation HanKook Phantom โ†’ phishing South Korean academics w/ RokRAT malware.
๐Ÿ”น LNK loaders + fileless PowerShell
๐Ÿ”น Exfil via Dropbox & GDrive
๐Ÿ”น Goal: espionage & persistence
๐Ÿ’ฌ Should academia ramp up defenses to enterprise SOC levels, or is that unrealistic?
Follow @technadu for more threat intel.

#CyberSecurity #APT37 #ScarCruft #RokRAT #Phishing #ThreatIntel

ScarCruft
2025-06-27

"ํƒˆ๋ถ์ž ๋ถ„๋“ค์„ ๋…ธ๋ฆฌ๋Š” ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด APT37(Reaper)์— ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊น€x๋ฏผ๋Œ€ํ‘œ๋‹˜๋ชจ๊ธˆ์บ ํŽ˜์ธ.lnk(2024.10.31)" published by Sakai. #APT37, #LNK, #DPRK, #CTI wezard4u.tistory.com/429521

2025-06-09

"๋Œ€๋ถ๊ด€๊ณ„์ž๋ฅผ ๋…ธ๋ฆฌ๋Š” ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ๋ฆฌํผ(Reaper)์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊ตญ๊ฐ€์ •๋ณด์™€ ๋ฐฉ์ฒฉ ์›๊ณ .lnk(2025.6.3)" published by Sakai. #APT37, #LNK, #RokRAT, #DPRK, #CTI wezard4u.tistory.com/429506

Anonymous ๐Ÿˆ๏ธ๐Ÿพโ˜•๐Ÿต๐Ÿด๐Ÿ‡ต๐Ÿ‡ธ :af:youranonriots@kolektiva.social
2025-05-12

Genians Security Center researchers analyse #APT37's โ€œOperation: ToyBox Storyโ€, in which the group used fake academic forum invites from a South Korean security think tank to lure victims and delivered malicious LNK files via the Dropbox cloud platform. genians.co.kr/en/blog/threat_i

2025-05-12

"Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)" published by Genians. #APT37, #LNK, #ToyBoxStory, #RokRAT, #DPRK, #CTI genians.co.kr/en/blog/threat_i

2025-05-12

"ํ•œ๊ตญ ๊ตญ๊ฐ€์•ˆ๋ณด์ „๋žต ์‹ฑํฌํƒฑํฌ ์œ„์žฅ APT37 ๊ณต๊ฒฉ ์‚ฌ๋ก€ ๋ถ„์„ (์ž‘์ „๋ช…. ํ† ์ด๋ฐ•์Šค ์Šคํ† ๋ฆฌ)" published by Genians. #APT37, #LNK, #RokRAT, #ToyBoxStory, #DPRK, #CTI genians.co.kr/blog/threat_inte

2025-04-29

"Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis" published by Google. #APT37, #CVE-2024-21338, #CVE-2024-38178, #Trend, #DPRK, #CTI cloud.google.com/blog/topics/t

2025-04-28

"NSFOCUS APT Monthly Briefing - March 2025" published by NSFOCUS. #APT37, #Lazarus, #Trend, #DPRK, #CTI nsfocusglobal.com/nsfocus-apt-

2025-04-18

"ํ•œ๊ธ€ ๋ฌธ์„œ๋กœ ์œ„์žฅํ•œ ๋‘ ๊ณต๊ฒฉ ๊ทธ๋ฃน์˜ ์•…์„ฑ์ฝ”๋“œ ๋น„๊ต" published by Logpresso. #APT37, #Konni, #RokRAT, #LNK, #DPRK, #CTI logpresso.com/ko/blog/2025-04-

2025-03-30

"๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด APT37(Reaper)์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-ํ•œ๊ตญ๊ตฐ์‚ฌํ•™๋…ผ์ด(2025.3.26)" published by Sakai. #APT37, #LNK, #RokRAT, #DPRK, #CTI wezard4u.tistory.com/429443

2025-03-20

"APT37 ๊ณต๊ฒฉ ๊ทธ๋ฃน์˜ ์ง€์†์  ์œ„ํ˜‘ ๊ณต๊ฒฉ" published by Hauri. #APT37, #LNK, #DPRK, #CTI download.hauri.net/DownSource/

2025-03-12
2025-03-04

"ํ•œ๊ธ€ ๋ฌธ์„œ๋กœ ์œ„์žฅํ•œ ๋‘ ๊ณต๊ฒฉ ๊ทธ๋ฃน์˜ ์•…์„ฑ์ฝ”๋“œ ๋น„๊ต" published by Logpresso. #APT37, #Konni, #LNK, #RokRAT, #DPRK, #CTI logpresso.com/ko/blog/2025-03-

2025-02-10

"Targeted Threats Research - South & North Korea (a breakdown of 3 years of threat research in Korea)" published by 0x0v1. #APT37, #CVE-2022-41128, #Kimsuky, #RambleOn, #RokRAT, #UCID902, #DPRK, #CTI 0x0v1.com/targeted-threats-res

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst