North Korean Hackers Use Facebook to Launch RokRAT Malware Attack

North Korean Hackers Exploit Facebook to Deploy RokRAT Malware

In a sophisticated cyber espionage campaign, North Korea’s state-sponsored hacking group, APT37 (also known as ScarCruft), has been leveraging Facebook to distribute the RokRAT malware. This operation underscores the evolving tactics of cyber adversaries in exploiting social media platforms for malicious purposes.

The Social Engineering Tactics

APT37 initiated the attack by creating two Facebook profiles, richardmichael0828 and johnsonsophia0414, both purportedly based in Pyongyang and Pyongsong, North Korea. These accounts, established on November 10, 2025, were used to send friend requests to targeted individuals. Once the targets accepted these requests, the attackers engaged them in conversations via Facebook Messenger, discussing topics of mutual interest to build trust.

Transition to Telegram and Malware Delivery

After establishing rapport, the attackers moved the conversation to Telegram, a messaging platform known for its encrypted communications. Here, they sent a ZIP file containing a tampered version of Wondershare PDFelement, a legitimate PDF viewer. This ZIP file also included four PDF documents and a text file with instructions to install the software, claiming it was necessary to view encrypted military documents.

Execution of the Attack

Upon installation, the compromised PDFelement software executed embedded shellcode, establishing initial communication with a command-and-control (C2) server hosted on a compromised website associated with a Japanese real estate information service in Seoul. This server then delivered a second-stage payload disguised as a harmless JPG image, which ultimately deployed the RokRAT malware.

Capabilities of RokRAT

RokRAT is a remote access trojan with a range of capabilities, including:

– Screen Capture: Periodically capturing screenshots of the infected system.

– Remote Command Execution: Executing commands remotely via cmd.exe.

– System Reconnaissance: Collecting detailed information about the host system.

– Evasion Techniques: Utilizing legitimate services like Zoho WorkDrive for C2 communications to evade detection by security software.

Evolving Strategies

This campaign highlights APT37’s strategic shift towards using social media platforms for initial contact and trust-building. By exploiting the credibility of Facebook and Telegram, the attackers increase the likelihood of their targets engaging with malicious content. Additionally, the use of legitimate software and services in the attack chain demonstrates a sophisticated approach to evading detection.

Broader Implications

The use of social engineering tactics by North Korean threat actors is not new. In previous campaigns, groups like Kimsuky have employed similar strategies, creating fake identities on platforms like Facebook to target individuals in sectors such as human rights and anti-North Korea activism. These operations often involve moving conversations to encrypted messaging platforms and delivering malware through seemingly innocuous files.

Recommendations for Users

To mitigate the risk of such attacks, users are advised to:

– Verify Contacts: Be cautious when accepting friend requests from unknown individuals, especially those claiming to be from sensitive regions or sectors.

– Scrutinize Files: Avoid downloading and installing software or opening files from unverified sources.

– Use Security Software: Employ reputable security solutions that can detect and block malicious activities.

– Stay Informed: Keep abreast of the latest cyber threats and tactics used by adversaries to enhance personal and organizational cybersecurity posture.

Conclusion

The exploitation of social media platforms by APT37 to distribute RokRAT malware underscores the need for heightened vigilance and robust cybersecurity measures. As threat actors continue to refine their tactics, a proactive and informed approach is essential to safeguard against such sophisticated cyber threats.