APT37, a North Korean-linked threat group, is back in action with a stealthy new variant of its RoKRAT malware, using shortcut (.lnk) files and image-based steganography to infect targets primarily in South Korea. The malware hides inside compressed archives and JPEG images, deploying a series of scripts and shellcode to spy on infected systems. It collects screenshots, system info, and documents, then exfiltrates the data through trusted cloud services like Dropbox and pCloud. This sophisticated, fileless attack chain highlights the growing challenge for traditional security tools and stresses the importance of advanced threat detection.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox