Table of Contents
March 5, 2025
|
10m

ScarCruft ( APT37)


A futuristic cybernetic face with glowing red eyes, surrounded by digital cables and floating data streams, symbolizing a cyber threat or AI-driven hacking entity.

ScarCruft, also known as APT37, is a sophisticated North Korean state-sponsored cyber espionage group. Active since at least 2012, this threat actor primarily targets South Korea but has expanded its operations to include Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East. ScarCruft's activities are characterized by their strategic intelligence-gathering focus, use of custom malware, and exploitation of zero-day vulnerabilities. This group poses a significant threat to governments, defense contractors, media outlets, and any organization involved in North Korean affairs. This article provides a deep dive into ScarCruft's origins, tactics, targets, notable campaigns, and defense strategies.

Origins & Evolution

ScarCruft, designated as APT37 by FireEye (now Trellix), was first publicly identified around 2017, although its activities date back to at least 2012. The group is also known by other aliases, including Group123, InkySquid, Reaper, Ricochet Chollima, and Ruby Sleet. Security researchers attribute ScarCruft's operations to the North Korean government with high confidence, based on targeting patterns, malware analysis, and infrastructure overlaps with other known North Korean threat actors.

Over time, ScarCruft has demonstrated a significant evolution in its tactics, techniques, and procedures (TTPs). Initially, the group relied heavily on watering hole attacks and spear-phishing emails, often leveraging vulnerabilities in Hangul Word Processor (HWP), a popular software in South Korea. More recently, ScarCruft has incorporated zero-day exploits into its arsenal, expanded its targeting to include a broader range of industries and geographies, and developed more sophisticated malware and command-and-control (C2) infrastructure. This continuous evolution indicates a dedicated and well-resourced threat actor committed to improving its capabilities and evading detection. There's some overlap and occasional confusion in attribution with other North Korean groups, particularly the Lazarus Group, as some researchers attribute all North Korean activity to that single entity. However, distinct tools, techniques, and targeting patterns support the classification of ScarCruft as a separate APT group. Learn more about APT groups and its threat intelligence .

Tactics & Techniques

ScarCruft's operations typically follow a multi-stage attack lifecycle, encompassing initial access, persistence, execution, privilege escalation, lateral movement, data exfiltration, and, in some cases, destructive capabilities.

  • Initial Access: ScarCruft employs a variety of initial access vectors, with social engineering being a cornerstone of their approach. They utilize highly targeted spear-phishing emails, often impersonating trusted individuals or organizations. These emails may contain malicious attachments (such as HWP, DOC, or LNK files) or links to compromised websites (watering hole attacks). They have also been observed using torrent file-sharing for more indiscriminate malware distribution.

  • Exploitation: ScarCruft has a history of exploiting vulnerabilities in Adobe Flash, Microsoft Internet Explorer/Edge's scripting engine, and, notably, Hangul Word Processor (HWP). They possess and utilize zero-day vulnerabilities (e.g., CVE-2018-0802, CVE-2024-38178), demonstrating their advanced capabilities. They have also utilized known vulnerabilities like CVE-2020-1380 and CVE-2021-26411. If you are interested in knowing CVSS score , here is the guide.

  • Execution & Persistence: The APT group uses various methods to execute their malware and achieve persistence. They utilize Windows Script Host (WSH), PowerShell scripts, and malicious JavaScript embedded in websites. For persistence, they often leverage scheduled tasks, registry run keys, or service creation. ScarCruft has also been observed using steganography, hiding malicious code or data within seemingly benign files (like images). Understanding Windows Registry structure is important here.

  • Command and Control (C2): ScarCruft employs a sophisticated and evolving C2 infrastructure to maintain communication with compromised systems. They utilize compromised servers, legitimate messaging platforms, and cloud service providers (e.g., Dropbox, Google Cloud, pCloud, Yandex Cloud, Microsoft Graph API) to evade detection and blend in with normal network traffic. They demonstrate a strong understanding of operational security (OPSEC), frequently changing their infrastructure and employing encryption to protect their communications.

  • Malware and Tools: ScarCruft utilizes a diverse suite of custom and publicly available malware. Some notable examples include:

* RokRAT: A fully-featured backdoor used for surveillance and data exfiltration. It often leverages cloud services for C2.

* Chinotto: A PowerShell backdoor used for reconnaissance and downloading additional payloads.

* BLUELIGHT: Malware that uses Microsoft Graph API (OneDrive) for C2, demonstrating advanced evasion techniques.

* Cobalt Strike: A commercially available penetration testing tool, often used as a first-stage payload.

* Dolphin: A custom backdoor.

* Wiper Malware: ScarCruft has access to destructive malware, indicating a potential for disruptive attacks beyond espionage. Let's explore more on malware scanning tool VirusTotal .

  • Lateral Movement: ScarCruft demonstrates the capability to move laterally within compromised networks, searching for additional targets and sensitive data. They utilize techniques like remote services and valid accounts for this purpose.

  • Data Exfiltration: The group's primary objective is to exfiltrate sensitive data. They target a wide range of information, including documents, credentials, and communications from applications like KakaoTalk and WeChat. They often use cloud services for data exfiltration, further complicating detection efforts.

  • Testing and Development: Recent research indicates that ScarCruft is actively involved in testing and developing new malware and infection chains. This includes experimenting with new techniques like using oversized LNK files and decoy documents related to threat research (e.g., reports on Kimsuky). As cybersecurity becomes more crucial, more people choose ethical hacking as a career.

Targets or Victimology

ScarCruft's targeting is primarily driven by North Korea's strategic intelligence requirements. While South Korea remains their primary focus, their operations have expanded to encompass a broader range of targets.

  • Geographic Focus:

* Primary: South Korea

* Secondary: Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and the Middle East.

  • Industry Verticals:

* Government

* Defense Contractors

* Media Organizations (particularly those focused on North Korean affairs)

* Experts on North Korean Affairs

* Chemicals

* Electronics

* Manufacturing

* Aerospace

* Automotive

* Healthcare

* Financial

* IT Providers

  • Political Motivations & Potential Impact: ScarCruft is believed to be operated by North Korean intelligence agencies, they have two goals. One is financial motivation, and the other is political motivation. Their cyberattacks pose many risks like Data breaches, Espionage, Operational disruption, and Intellectual Property theft.

  • Strategic Intelligence Gathering: ScarCruft's operations are designed to gather strategic intelligence that can inform North Korean policy and decision-making. This includes information on:

* South Korean government policies and military capabilities.

* International sanctions against North Korea.

* Foreign policy perspectives on North Korea.

* Cyber threat intelligence and defense strategies used by security professionals.

* Internal data from targeted industries

Attack Campaigns

Several notable attack campaigns have been attributed to ScarCruft, demonstrating the group's evolution and capabilities:

  • Operation Daybreak (2016): Targeted South Korean government and military entities, leveraging vulnerabilities in Hangul Word Processor (HWP).

  • Operation Erebus (2017): Utilized watering hole attacks to compromise websites frequented by targets of interest.

  • Operation Code on Toast (2024): Exploited a zero-day vulnerability (CVE-2024-38178) in the Windows Scripting Engine (Internet Explorer Mode in Edge) through compromised "toast" advertisement programs in South Korea, leading to the deployment of RokRAT.

  • Daily NK Strategic Web Compromise (2021): Injected malicious code into the Daily NK website (a South Korean online newspaper focusing on North Korean issues), exploiting vulnerabilities in Internet Explorer (CVE-2020-1380 and CVE-2021-26411) to deliver Cobalt Strike and BLUELIGHT malware.

  • Late 2023 Campaigns: Involved phishing emails impersonating members of North Korean research institutes and news organizations, using malicious LNK and HWP files to deliver RokRAT. These campaigns also targeted cybersecurity professionals by using threat research reports as decoys.

  • Multiple campaigns utilizing diverse attack vectors (2022-2023): ScarCruft employed various methods to deliver the Chinotto PowerShell backdoor, including CHM files, malicious Excel Add-ins (XLL), LNK files, macro-based MS Office documents, and HWP files with embedded OLE objects. To understand security you should also know Basics of Linux .

These campaigns highlight ScarCruft's adaptability, their focus on strategic intelligence gathering, and their willingness to employ sophisticated techniques, including zero-day exploits and complex infection chains. Kali Linux helps with vulnerability assesment.

Defenses

Defending against ScarCruft requires a multi-layered approach that encompasses proactive prevention, detection, and response measures.

  • Security Awareness Training: Educate users about the risks of phishing emails, suspicious attachments, and malicious links. Emphasize the importance of verifying the sender's identity and avoiding clicking on links or opening attachments from untrusted sources. This is particularly crucial given ScarCruft's heavy reliance on phishing attacks or social engineering.

  • Patch Management: Implement a robust patch management program to ensure that all software, including operating systems, applications (especially HWP, Adobe Flash, and browsers), and security tools, are up-to-date with the latest security patches. This is critical for mitigating the risk of exploitation of known vulnerabilities. Here's an article about patch management strategy.

  • Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor endpoint activity for malicious behavior, such as unusual process execution, file modifications, and network connections. EDR can help detect and respond to ScarCruft's malware and TTPs.

  • Network Monitoring: Implement network intrusion detection and prevention systems (IDS/IPS) to monitor network traffic for suspicious activity, such as connections to known C2 servers or unusual data exfiltration patterns. You need to implement security logging and monitoring.

  • Threat Intelligence: Leverage threat intelligence feeds and platforms to stay informed about ScarCruft's latest TTPs, IOCs, and campaigns. This information can be used to proactively adjust security controls and hunt for potential threats.

  • Multi-Factor Authentication (MFA): Implement MFA for all critical systems and accounts to reduce the risk of credential theft and unauthorized access.

  • Application Control: Restrict the execution of unauthorized applications, particularly those commonly used by ScarCruft, such as mshta.exe.

  • Macro Security: Disable or restrict macros in Microsoft Office applications, as these are often used as an initial infection vector.

  • Cloud Security Monitoring: Monitor cloud service usage for suspicious activity, as ScarCruft frequently leverages cloud platforms for C2 and data exfiltration.

  • Incident Response Plan: Develop and regularly test an incident response plan to ensure that your organization can effectively respond to and recover from a ScarCruft intrusion. Knowing about the incident response lifecycle is a must.

  • YARA rules: Implement and update the Yara rules for ScarCruft-associated malware detection.

Conclusion

ScarCruft (APT37) is a highly capable and persistent North Korean state-sponsored threat actor that poses a significant risk to organizations worldwide, particularly those involved in South Korean affairs, defense, media, and other strategically important sectors. Their continuous evolution of tactics, use of zero-day exploits, sophisticated malware, and dedication to operational security make them a challenging adversary. By understanding ScarCruft's TTPs, targets, and past campaigns, organizations can implement effective defenses and proactively mitigate the risk of a successful attack. A combination of robust security awareness training, proactive vulnerability management, advanced threat detection capabilities, and a well-defined incident response plan is essential for defending against this persistent and evolving threat. Cyber security is very challenging in today's business.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe