Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/Threats/ScarCruft Abuses Cloud Services & OLE to Legitimate OLE-based
Threats

ScarCruft Abuses Cloud Services & OLE to Legitimate OLE-based

A newly identified campaign shows ScarCruft, a prolific North Korean-backed advanced persistent threat (APT) group, has significantly refined its cyberespionage capabilities through the distribution...

Emy Elsamnoudy
Emy Elsamnoudy
February 9, 2026 2 Min Read
6 0

A newly identified campaign shows ScarCruft, a prolific North Korean-backed advanced persistent threat (APT) group, has significantly refined its cyberespionage capabilities through the distribution of ROKRAT malware.

This recent activity marks a strategic deviation from their traditional reliance on LNK-based attack chains, pivoting instead to a complex infection method utilizing Object Linking and Embedding (OLE) objects embedded within Hangul Word Processor (HWP) documents.

The primary objective of these evolved tactics is to stealthily infiltrate targeted systems and execute the ROKRAT remote access trojan directly in memory, minimizing traces.

The attackers have continued their established pattern of abusing legitimate cloud infrastructure to facilitate command and control (C2) communications.

By leveraging trusted services such as pCloud and Yandex, ScarCruft effectively camouflages their malicious traffic amidst standard network noise, making detection and blocking efforts significantly more challenging for network defenders.

This strategic reliance on commercial cloud platforms ensures that the malware can reliably retrieve payloads and receive instructions while bypassing network-based blocking mechanisms that might otherwise flag suspicious connections.

S2W analysts noted shifting delivery mechanisms. Though the specific delivery mechanisms have shifted, the underlying technical signatures remain consistent with historical ScarCruft operations.

The researchers confirmed that all analyzed cases exhibit distinct behaviors, such as the use of ROR13-based API resolving and a unique 0x29 XOR key for payload decryption.

These technical overlaps provide strong attribution evidence, definitively linking the new OLE-based vectors to the group’s established tools.

OLE-Based Injection and DLL Side-Loading

The infection mechanism centers on embedding malicious Droppers and Loaders as OLE objects.

Upon interaction with a compromised HWP document, these objects initiate the attack, frequently employing DLL side-loading to hide as legitimate system processes to evade security monitoring.

For instance, malicious files named mpr.dll or credui.dll are side-loaded into vulnerable applications like ShellRunas.exe.

In the first case, the Dropper releases a payload from its resource area, while in others, it acts as a downloader, retrieving shellcode that is hidden via steganography from Dropbox links.

The Loader then rigorously verifies the analysis environment before decrypting the internal payload using a 1-byte XOR key, ensuring ROKRAT executes stealthily within system memory.

To mitigate these risks, organizations must exercise extreme caution with HWP documents received via phishing emails.

Since executing documents containing malicious OLE objects can lead to arbitrary code execution, security teams should refrain from opening files from unclear sources and strengthen threat detection rules to identify abnormal OLE objects embedded in HWP files.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

LTX Stealer Attack Targets Users to Ex Node.js Based

Next Post

Roundcube Webmail Flaw Lets Attackers Track Email Vulnerability Opens

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us