#RokRAT

2025-05-12

"Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)" published by Genians. #APT37, #LNK, #ToyBoxStory, #RokRAT, #DPRK, #CTI genians.co.kr/en/blog/threat_i

2025-05-12

"한국 국가안보전략 싱크탱크 위장 APT37 공격 사례 분석 (작전명. 토이박스 스토리)" published by Genians. #APT37, #LNK, #RokRAT, #ToyBoxStory, #DPRK, #CTI genians.co.kr/blog/threat_inte

2025-04-18

"한글 문서로 위장한 두 공격 그룹의 악성코드 비교" published by Logpresso. #APT37, #Konni, #RokRAT, #LNK, #DPRK, #CTI logpresso.com/ko/blog/2025-04-

2025-03-30

"북한 해킹 단체 APT37(Reaper)에서 만든 악성코드-한국군사학논총(2025.3.26)" published by Sakai. #APT37, #LNK, #RokRAT, #DPRK, #CTI wezard4u.tistory.com/429443

2025-03-27

"학술논문으로 위장하여 유포 중인 RokRAT 악성코드 주의!" published by ESTSecurity. #LNK, #RokRAT, #DPRK, #CTI alyacofficialblog.tistory.com/

2025-03-04

"한글 문서로 위장한 두 공격 그룹의 악성코드 비교" published by Logpresso. #APT37, #Konni, #LNK, #RokRAT, #DPRK, #CTI logpresso.com/ko/blog/2025-03-

2025-02-19

"APT-C-28(ScarCruft)组织利用无文件方式投递RokRat的攻击活动分析" published by Qihoo360. #APT-C-28, #RokRAT, #DPRK, #CTI mp.weixin.qq.com/s?__biz=MzUyM

2025-02-10

"Targeted Threats Research - South & North Korea (a breakdown of 3 years of threat research in Korea)" published by 0x0v1. #APT37, #CVE-2022-41128, #Kimsuky, #RambleOn, #RokRAT, #UCID902, #DPRK, #CTI 0x0v1.com/targeted-threats-res

Ziel sind vor allem südkoreanische Menschenrechtsaktivisten und politische Einrichtungen in Europa. #CyberSecurity #ScarCruft #RokRAT #ZeroDay

TheDoctorTheDoctor512
2024-12-12

Die nordkoreanische Hackergruppe ScarCruft startet eine neue Cyber-Überwachungskampagne, die eine Zero-Day-Schwachstelle im Internet Explorer ausnutzt, um RokRAT-Malware zu verbreiten. Über 'Toast'-Pop-up-Werbung wird der Schadcode ohne Benutzerinteraktion ausgeführt. Ziel sind vor allem südkoreanische Menschenrechtsaktivisten und politische Einrichtungen in Europa.

2024-11-29

"Introduction to the North Korea-backed Scarcruft ROKRAT Malware Cluster" published by S2W. #CloudMensis, #RokRAT, #ScarCruft, #DPRK, #CTI s2w.inc/en/resource/detail/678

2024-11-07

"APT37 aka ScarCruft or RedEyes – Active IOCs" published by Rewterz. #APT37, #RokRAT, #DPRK, #CTI rewterz.com/threat-advisory/ap

2024-11-04

"북한 APT 리퍼(Reaper)에서 만든 탈북민 사칭 한국해양수산연수원 타겟 인것으로 추측이 되는 악성코드-정보접근권.lnk(2024.11.1)" published by Sakai. #APT37, #RokRAT, #LNK, #DPRK, #CTI wezard4u.tistory.com/429316

2024-10-21

#Internet_Explorer#ゼロデイ脆弱性#北朝鮮 のサイバー攻撃者が悪用 | TECH+ (テックプラス)
影響と対策. この #サイバー攻撃 で配布された #マルウェア#RokRAT 」 の亜種は、Windowsスタートアップを使用して永続性を確保する …
news.mynavi.jp/techplus/articl

2024-10-17

"Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine" published by S2W. #APT37, #CVE-2024-38178, #RokRAT, #DPRK, #CTI medium.com/s2wblog/unmasking-c

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2024-10-16

🔥 One click, and chaos begins!

#NorthKorean #APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with #RokRAT malware.

thehackernews.com/2024/10/nort

#infosec

2024-10-16

"ASEC과 국가사이버안보센터(NCSC), 합동 보고서 배포 및 Microsoft 브라우저 0-DAY 발견 (CVE-2024-38178)" published by Ahnlab. #CVE-2024-38178, #CodeonToast, #TA-RedAnt, #RokRAT, #DPRK, #CTI asec.ahnlab.com/ko/83876/

2024-05-07

"LNK File Disguised as Certificate Distributing RokRAT Malware" published by Ahnlab. #RokRAT, #LNK, #RedEyes, #CTI, #OSINT, #LAZARUS asec.ahnlab.com/en/65076/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst