Blog Cybersecurity iPhone Samsung Technology Updates Windows About Contact Password Generator

North Korea’s APT37 Uses Facebook to Spread RokRAT Malware via Social Engineering

April 14, 2026 5 min read Cybersecurity

A cyber espionage campaign linked to APT37 (also known as ScarCruft) has been uncovered, revealing how attackers are using Facebook to deliver the RokRAT remote access trojan (RAT) through advanced social engineering techniques.

🎯 How the Attack Works

According to security researchers, attackers create fake Facebook profiles with locations set to North Korea, then:

  1. Send friend requests to targeted individuals
  2. Build trust through casual conversations
  3. Move communication to Messenger or Telegram
  4. Deliver a malicious ZIP file containing infected software

This method turns social media into a direct malware delivery channel.


📄 Fake PDF Viewer as Infection Vector

The core of the attack relies on pretexting, where victims are tricked into installing a fake PDF viewer to open “encrypted military documents.”

The attackers use a modified version of Wondershare PDFelement, which:


🖼️ Malware Hidden Inside JPG Files

In a highly evasive technique, the second-stage payload is disguised as a harmless JPG image file, which ultimately delivers the RokRAT malware.

The campaign also abuses legitimate infrastructure, including compromised websites and cloud services like Zoho WorkDrive, to avoid detection.


⚠️ What RokRAT Can Do

Once installed, RokRAT enables attackers to:

This makes it a powerful tool for cyber espionage and data theft.


🚨 Why This Attack Is Dangerous

This campaign stands out because it combines:

Experts warn that APT37 continues to evolve its delivery and evasion methods, making detection increasingly difficult.


🛡️ How to Stay Safe

To protect yourself:

More Cybersecurity articles
Share: