May 4, 2023, 11:05 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Microsoft's implementation of default macro blocking across Office documents has prompted North Korean state-sponsored threat operation Scarcruft, also known as APT37, Nickel Foxcroft, RedEyes, InkySquid, Ricochet Chollima, and Reaper, to leverage oversized LNK files to facilitate RokRAT malware delivery since last July, according to The Hacker News.


Article Link: Large LNK files leveraged for RokRAT malware deployment | SC Media


1 post - 1 participant


Read full topic

apt37 article blocking default delivery deployment documents files hacker july large link lnk macro malware microsoft nickel north north korean office redeyes ricochet rokrat rokrat malware scarcruft sponsored state threat

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)