APT37

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
APT37, also known as ScarCruft, Reaper, or Group123, is a threat actor suspected to be linked to North Korea. It primarily targets South Korea but has also extended its activities to Japan, Vietnam, and the Middle East, focusing on various industry verticals such as chemicals, electronics, manufacturing, aerospace, automotive, and healthcare. The group was first reported by Talos in 2017 when it identified the ROKRAT malware, consistently attributed to APT37. Additionally, the group has access to destructive malware and uses custom malware for espionage purposes. The group was first discovered in 2021 and has been continually developing its malicious capabilities. In our report, we detail various infection chains and lures used by APT37 in their recent attacks, resulting in the deployment of payloads like ROKRAT and Amadey. The group has also developed a specific malware named CloudMensis, which seeks to identify where SIP is disabled to load its own malicious database. While another report provides a technical analysis of one of the ROKRAT campaigns, our report offers further insights into additional campaigns by APT37 and a deeper analysis of the ROKRAT malware. Over the past year, APT37 has been involved in significant cyber campaigns against Russia, including an attack on a Russian defense enterprise that resulted in a data leak. Despite Russia and North Korea's close ties, North Korean cyberespionage groups such as the Konni Group, Kimsuky Group, and APT37 have frequently targeted Russian government organizations. These activities indicate a complex and evolving threat landscape involving multiple actors and groups, with APT37 playing a crucial role.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
ScarCruft
8
ScarCruft, also known as APT37, Inky Squid, RedEyes, Reaper, or Group123, is a North Korean threat actor group associated with malicious cyber activities. Their actions have been linked to the execution of targeted attacks against individual Android devices, as outlined in a VB2023 paper titled "Int
Reaper
6
Reaper, also known as APT37, Inky Squid, RedEyes, or ScarCruft, is a threat actor group attributed to North Korea. It deploys ROKRAT, a malicious tool that has been used in cyber exploitation since the 1970s. This group is also tied to the NOKKI malware family, which originated from research surroun
Kimsuky
4
Kimsuky is a North Korea-linked advanced persistent threat (APT) group that conducts global cyber-attacks to gather intelligence for the North Korean government. The group has been identified as a significant threat actor, executing actions with malicious intent, and has recently targeted victims vi
Group123
3
Group123, also known as Inky Squid or APT37, is a threat actor group suspected of executing malicious cyber activities. They are known for their technical capabilities and innovative intrusion techniques. Over the past 18 months, they have been associated with a series of attacks that utilize shellc
Redeyes
2
RedEyes, also known as APT37, StarCruft, Reaper, or BadRAT, is a threat actor group known for its malicious cyber activities. This group recently deployed a new malware named FadeStealer to extract information from targeted systems. They have also been observed using CloudMensis, a malware that seek
InkySquid
1
InkySquid, also known as ScarCruft and APT37, is a threat actor believed to be associated with North Korea. This group has been identified as the exclusive user of RokRAT, a closed-source malware family. The actions of this group are monitored by cybersecurity firms such as Volexity, which uses the
HIDDEN COBRA
1
Hidden Cobra, also known as the Lazarus Group and Sapphire Sleet, is a North Korean cyberespionage group that has been active since at least 2009. The U.S. Government uses the term Hidden Cobra to refer to malicious cyber activities by the North Korean government, with the BeagleBoyz representing a
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Korean
Windows
Exploit
Phishing
Apt
Espionage
Backdoor
State Sponso...
Russia
Microsoft
Vulnerability
Rat
Zero Day
exploited
Reconnaissance
Infostealer
Implant
Wiper
RCE (Remote ...
Trojan
Operation Tr...
Github
Mandiant
Macos
Chrome
Domains
Android
Volexity
exploitation
Data Leak
Cybercrime
State Sponso...
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
ROKRATUnspecified
6
RokRAT is a sophisticated malware that has been used by the cyber-espionage group ScarCruft, primarily to target South Korean media and research organizations. The malware is typically delivered via phishing emails with ZIP file attachments containing LNK files disguised as Word documents. However,
KONNIUnspecified
4
Konni is a malware, short for malicious software, that poses a significant threat to computer systems and data. It's designed to infiltrate systems surreptitiously through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, Konni can wreak havoc by stealin
AmadeyUnspecified
3
Amadey is a malicious software (malware) that has been found to be used in conjunction with other malware such as Remcos, GuLoader, and Formbook. Analysis of the infection chains revealed that the individual behind the sales of Remcos and GuLoader also uses Amadey and Formbook, using GuLoader as a p
DolphinUnspecified
1
Dolphin is a malicious software (malware) that was reportedly used by an unidentified group against South Korea in December 2022. The malware, named after the codenames of Xerox PARC's range of workstations which all began with the letter D, including Dolphin, Dorado, Dicentra, and others, infiltrat
Bluelight MalwareUnspecified
1
The Bluelight malware is a harmful software program designed to exploit and damage computer systems. It was identified by Volexity in a recent investigation, where it was found being delivered to a victim alongside another malware, RokRAT. The Bluelight malware infiltrates systems through suspicious
InksquidUnspecified
1
None
BadratUnspecified
1
None
DOGCALLUnspecified
1
Dogcall, also known as ROKRAT, is a remote access Trojan (RAT) malware first reported by Talos in April 2017. It has consistently been attributed to the Advanced Persistent Threat (APT37) group, also known as Reaper. The malware uses third-party hosting services for data upload and command acceptanc
CloudmensisUnspecified
1
CloudMensis, a form of malware specifically designed to exploit macOS systems, was first brought to light by ESET in July 2022. The software infiltrates devices primarily through email attachments, causing significant security breaches once inside. Once installed, CloudMensis works diligently to ide
BLUELIGHTUnspecified
1
The BLUELIGHT malware, first observed in early 2021, was used as the final payload in a multistage attack. This attack involved a watering-hole assault on a South Korean online newspaper, an Internet Explorer exploit, and another ScarCruft backdoor. The attack process included multiple components li
OpencarrotUnspecified
1
OpenCarrot is a malicious software (malware) that targets Windows operating systems, enabling unauthorized access and control over infected machines. Identified by IBM XForce, it has been linked to the activities of the Lazarus Group, a North Korean cyber threat operation known for its sophisticated
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Lazarus GroupUnspecified
3
The Lazarus Group, a notorious threat actor believed to be linked to North Korea, has been attributed with a series of significant cyber-attacks over the past few years. The group's malicious activities include the exploitation of digital infrastructure, stealing cryptocurrency, and executing large-
Apt43Unspecified
2
APT43, also known as Kimsuky, is a North Korean state-sponsored advanced persistent threat (APT) group that has been actively involved in cybercrime and espionage. The group has been implicated in a series of attacks exploiting vulnerabilities, which have drawn the attention of various cybersecurity
ThalliumUnspecified
1
Thallium, also known as Kimsuky, Velvet Chollima, and APT43, is a North Korean state-sponsored threat actor or hacking group that has been active since 2012. Tracked by the Cybereason Nocturnus Team and other security researchers, this cyber espionage group is believed to operate on behalf of the No
RgbUnspecified
1
RGB, a threat actor with ties to North Korea, has been involved in a range of malicious cyber activities. The group was designated by the Office of Foreign Assets Control (OFAC) on January 2, 2015, under Executive Order 13687 for being a controlled entity of the North Korean government. In addition
AndarielUnspecified
1
Andariel, a notorious threat actor associated with the Lazarus Group and linked to North Korea, is known for its malicious cyber activities. The group has been identified using DTrack malware and Maui ransomware, notably in mid-2022, and has developed a reputation for exploiting ActiveX objects. Res
BluenoroffUnspecified
1
BlueNoroff, a threat actor closely associated with the notorious Lazarus Group, has been actively involved in malicious cyber activities primarily targeting financial institutions and cryptocurrency businesses. Known for its sophisticated attacks on banks, casinos, fintech companies, POST software,
Reconnaissance General Bureau RgbUnspecified
1
The Reconnaissance General Bureau (RGB) is a North Korean military intelligence agency identified as a threat actor responsible for various cyberattacks. RGB is associated with hacking groups known as the "Lazarus Group," "Bluenoroff," and "Andariel," which are recognized as agencies or controlled e
Reconnaissance General BureauUnspecified
1
The Reconnaissance General Bureau (RGB) is a North Korean intelligence agency responsible for clandestine operations abroad, including cyber activities. The RGB has been associated with several threat actors, including the BeagleBoyz, who have likely been active since at least 2014. Other groups lin
Konni GroupUnspecified
1
The Konni Group, also known as TA406, is a threat actor believed to be associated with North Korean cyberespionage activities. According to cybersecurity firm DuskRise, the group has been involved in sophisticated cyberattacks, including one where they compromised a foreign ministry email account to
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CVE-2022-41128Unspecified
2
None
CVE-2022-0609Unspecified
1
CVE-2022-0609 is a zero-day vulnerability discovered in Google Chrome, originating from a flaw in software design or implementation. This security loophole was exploited by North Korean government-backed threat actors in early 2022 to target various US organizations across the media, high-tech, and
Source Document References
Information about the APT37 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
DARKReading
3 months ago
Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft
DARKReading
3 months ago
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
DARKReading
3 months ago
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
CERT-EU
5 months ago
Russia and Belarus targeted by at least 14 nation-state hacker groups, researchers say | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
BankInfoSecurity
5 months ago
North Korean Group Seen Snooping on Russian Foreign Ministry
Recorded Future
7 months ago
North Korea’s Cyber Strategy | Recorded Future
MITRE
7 months ago
Operation (노스 스타) North Star A Job Offer That’s Too Good to be True? | McAfee Blog
CERT-EU
9 months ago
Trojanized VNC apps leveraged in defense-targeted Lazarus Group attacks
CERT-EU
9 months ago
Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps
CERT-EU
9 months ago
North Korean defectors' group leader attacked by state-backed hackers
CERT-EU
10 months ago
North Korean Hackers Continue to Refine Their Arsenal of Tactics & Techniques
DARKReading
10 months ago
North Korea's State-Sponsored APTs Organize & Align
Recorded Future
10 months ago
Multi-year Chinese APT Campaign Targets South Korean Academic, Government, and Political Entities | Recorded Future
CERT-EU
a year ago
Microsoft: North Korean hackers target Russian govt, defense orgs
CERT-EU
a year ago
Russian missile manufacturer subjected to North Korean APT attack
CERT-EU
a year ago
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company
CERT-EU
a year ago
North Korean Hackers Targets Russian Missile Engineering Firm
BankInfoSecurity
a year ago
North Korean Hackers Phishing With US Army Job Lures
BankInfoSecurity
a year ago
N Korean Hackers Phishing With US Army Job Lures
CERT-EU
a year ago
Stark#Mule Malware Campaign Targets Koreans, Uses US Army Documents