The North Korean state-backed threat group APT37 has been linked to a targeted spear-phishing campaign aimed at North Korean defectors and activists. Dubbed “Operation: ToyBox Story” by the Genians Security Center (GSC), the operation leveraged legitimate cloud platforms like Dropbox as part of its command-and-control (C2) setup to evade detection by security tools. The attackers distributed malicious LNK (shortcut) files via phishing emails that contained themes tied to North Korean troop movements in Russia and a fabricated national security event allegedly organized by a South Korean research institution. These emails included Dropbox links leading to ZIP files which, once extracted and executed, launched RoKRAT, a malware used for surveillance and data theft. RoKRAT utilizes multiple layers of encryption including XOR obfuscation, AES-CBC-128 encryption, and RSA key wrapping to secure the stolen information and communication with its C2 servers. Notably, the malware authenticated Dropbox sessions using access tokens tied to Yandex email accounts, a Russian email provider. This highlights APT37’s tactic of "Living off Trusted Sites" (LoTS) using legitimate services to disguise their activity. Additionally, investigators found evidence that the group used commercial VPN services such as NordVPN and AstrillVPN to obscure the origin of their operations and maintain anonymity. These methods demonstrate the group’s evolving tradecraft and its ability to blend into trusted infrastructure while conducting cyber-espionage campaigns.
A security breach resulting in unauthorized access to GitHub internal repositories was reported due to a compromised device belonging to a GitHub employee. According to GitHub, the...
Cybersecurity researchers have identified an ongoing malware campaign distributing the ValleyRAT remote access trojan through fake Microsoft Teams download websites. Threat actors ...