Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenAI Daybreak Automates Detects and Fix Vulnerabilities
May 12, 2026
BitUnlocker Downgrade Attacks on Windows Allows Access
May 12, 2026
Exploit: Hackers Take Over cPanel Abuse CVE-2026-41940
May 12, 2026
Home/Threats/APT37 Uses Tampered Installers, Facebook & Telegram
Threats

APT37 Uses Tampered Installers, Facebook & Telegram

APT37, a North Korean state-sponsored threat group, has initiated a new targeted intrusion campaign. This operation leverages social media platforms, encrypted messaging applications, and a...

David kimber
David kimber
April 13, 2026 3 Min Read
7 0

APT37, a North Korean state-sponsored threat group, has initiated a new targeted intrusion campaign. This operation leverages social media platforms, encrypted messaging applications, and a meticulously tampered software installer to compromise victims. A detailed report

The campaign began on social networks. The threat actor created two Facebook accounts — “richardmichael0828” and “johnsonsophia0414” — both registered on November 10, 2025, with profile locations set to Pyongyang and Pyongsong, North Korea.

After sending friend requests to carefully selected targets, the actor built trust through one-on-one Messenger conversations, then shifted the discussion toward military weapons technology.

Once genuine interest was established, communication moved to Telegram, where the actual malicious content was delivered.

Analysts at Genians Security Center identified this campaign as a pretexting-based attack — a social engineering method where the attacker builds a believable false scenario to push victims into taking a specific action.

The actor claimed to be sharing encrypted PDFs containing classified military weapon data, telling targets they needed a special viewer to open those files.

That viewer turned out to be a tampered Wondershare PDFelement installer. The malicious file arrived inside an encrypted ZIP archive named “m.zip,” packaged alongside decoy military-themed PDFs and a fake user guide to appear completely legitimate.

File Delivery via Telegram (Source - Genians)
File Delivery via Telegram (Source – Genians)

The tampered installer closely resembled the official Wondershare PDFelement software but carried no valid digital signature — a clear indicator that the binary had been modified.

While the legitimate file is named “Wondershare_PDFelement_Installer.exe,” the malicious version used “Wondershare_PDFelement_Installer(PDF_Security).exe” to pass as a security-enhanced release.

Once a victim ran the file, the installation appeared completely normal. In the background, however, embedded shellcode launched immediately and connected to attacker-controlled infrastructure, routing follow-on commands through the Seoul branch website of a Japanese real estate company to blend into normal network traffic.

The malware retrieved a second-stage payload disguised as a JPG image from the domain “japanroom[.]com.”

Analysis of the C2 URL XOR Decryption Process (Source - Genians)
Analysis of the C2 URL XOR Decryption Process (Source – Genians)

Stolen data — including screenshots, documents in formats such as DOC, XLS, PDF, HWP, and audio recordings — was exfiltrated to Zoho WorkDrive cloud storage through hardcoded OAuth2 tokens, making the outbound traffic appear indistinguishable from ordinary cloud activity.

Shellcode Execution and Process Injection

The most technically refined part of this attack was shellcode embedded into the tampered installer through a method known as PE patching, or code cave injection.

Entry Point Comparison (Source - Genians)
Entry Point Comparison (Source – Genians)

The legitimate installer’s starting address at 0x00114103 was replaced with a new entry point at 0x0015A0E0, sitting in an unused region near the end of the .text code section. Roughly 2 KB of malicious shellcode was quietly inserted into that space.

When the installer ran, execution jumped to this shellcode, which created a suspended instance of dism.exe — a built-in Windows utility — using the CREATE_SUSPENDED flag.

The attacker’s payload was decrypted through a single-byte XOR operation with key 0x6D and written into dism.exe’s memory via WriteProcessMemory.

A remote thread then started the injected code. No malicious file ever touched the disk, making this a fileless attack that standard antivirus tools would struggle to detect.

Malicious Command Execution Flow (Source - Genians)
Malicious Command Execution Flow (Source – Genians)

After all malicious steps completed, execution returned to the normal PDFelement installation process, leaving the victim with no visible reason for concern.

Organizations working with defense or government materials should verify digital signatures on all software installers before running them, avoid installing programs received through messaging platforms without confirming the official source.

Besides this, deploy endpoint detection solutions that flag abnormal child processes spawned by installers, watch for unexpected outbound connections to cloud services like Zoho WorkDrive, and run regular security awareness training specifically covering social engineering attacks that originate through social networks rather than email.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Microsoft Confirms Windows 11 Updates Break Push Button Reset

Next Post

Basic-Fit Data Breach Exposes Millions of Users Across Multiple

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Hackers Deliver Malware via Fake DeepSeek TUI GitHub Rep
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us