May 4, 2023, 11:05 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Microsoft's implementation of default macro blocking across Office documents has prompted North Korean state-sponsored threat operation Scarcruft, also known as APT37, Nickel Foxcroft, RedEyes, InkySquid, Ricochet Chollima, and Reaper, to leverage oversized LNK files to facilitate RokRAT malware delivery since last July, according to The Hacker News.


Article Link: Large LNK files leveraged for RokRAT malware deployment | SC Media


1 post - 1 participant


Read full topic

apt37 article blocking default delivery deployment documents files hacker july large link lnk macro malware microsoft nickel north north korean office redeyes ricochet rokrat rokrat malware scarcruft sponsored state threat

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Director, Cybersecurity - Governance, Risk and Compliance (GRC)

@ Stanley Black & Decker | New Britain CT USA - 1000 Stanley Dr

Information Security Risk Metrics Lead

@ Live Nation Entertainment | Work At Home-Connecticut

IT Product Owner - Enterprise DevSec Platform (d/f/m)

@ Airbus | Hamburg - Finkenwerder

Senior Information Security Specialist

@ Arthur Grand Technologies Inc | Arlington, VA, United States

Information Security Controls SME

@ Sword | Aberdeen, Scotland, United Kingdom