Threat Advisories:

RoKRAT Resurfaces: APT37’s Fileless Shortcut to Espionage

Amber | Attack Report
Download PDF

APT37, a North Korean-linked threat group, is back in action with a stealthy new variant of its RoKRAT malware, using shortcut (.lnk) files and image-based steganography to infect targets primarily in South Korea. The malware hides inside compressed archives and JPEG images, deploying a series of scripts and shellcode to spy on infected systems. It collects screenshots, system info, and documents, then exfiltrates the data through trusted cloud services like Dropbox and pCloud. This sophisticated, fileless attack chain highlights the growing challenge for traditional security tools and stresses the importance of advanced threat detection.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs