Anavem
Languagefr
Smartphone showing Facebook friend requests in dark cybersecurity setting

APT37 Deploys RokRAT via Facebook Social Engineering

North Korean APT37 hackers use Facebook friend requests to deliver RokRAT malware through sophisticated social engineering attacks.

13 April 2026, 11:15 4 min read

Last updated 13 April 2026, 23:23

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSUnavailable
VENDORFacebook/Meta
AFFECTEDFacebook social media platform...
CATEGORYCyber Attacks

Key Takeaways

APT37 Launches Facebook-Based RokRAT Campaign

North Korean state-sponsored hacking group APT37, also known as ScarCruft, has initiated a sophisticated social engineering campaign targeting victims through Facebook. The attack begins with threat actors creating fake profiles and sending friend requests to carefully selected targets, establishing trust before deploying the RokRAT remote access trojan.

The campaign represents a significant evolution in APT37's tactics, moving beyond traditional spear-phishing emails to exploit social media platforms for initial access. Security researchers discovered the operation after analyzing suspicious Facebook activity patterns and malware samples that exhibited characteristics consistent with previous APT37 campaigns.

APT37 has operated since at least 2012, primarily targeting South Korean government entities, defense contractors, and journalists. The group is known for its advanced persistent threat capabilities and has previously used custom malware families including DOGCALL, KARAE, and POORAIM. This latest campaign demonstrates the group's continued adaptation to modern attack vectors and their willingness to exploit social media platforms for intelligence gathering operations.

The Facebook-based delivery mechanism allows APT37 to bypass traditional email security controls while leveraging the inherent trust users place in social media connections. Once targets accept friend requests, the attackers can gather additional intelligence about their victims through profile information, connections, and shared content before launching the next phase of their attack.

Target Profile and Geographic Scope

The campaign primarily targets individuals in South Korea, particularly those working in government agencies, defense contractors, and media organizations. APT37's historical targeting patterns suggest the group focuses on entities that possess intelligence of strategic value to North Korean interests, including diplomatic personnel, military contractors, and investigative journalists covering North Korean affairs.

Security researchers have identified multiple fake Facebook profiles used in the campaign, each carefully crafted to appear legitimate and relevant to the intended targets. These profiles often impersonate journalists, researchers, or professionals in fields related to Korean peninsula affairs. The attackers invest significant time in building credible online personas, including posting relevant content and establishing connections with other users to enhance their profiles' authenticity.

The geographic focus extends beyond South Korea to include Korean diaspora communities and international organizations involved in Korean peninsula security issues. Targets may include think tank researchers, academic institutions studying North Korean affairs, and international diplomatic personnel stationed in the region. The campaign's scope suggests a coordinated intelligence collection effort aimed at gathering information about South Korean government policies, defense capabilities, and international diplomatic initiatives related to North Korea.

RokRAT Deployment and Technical Analysis

Once targets accept Facebook friend requests, APT37 operators engage in extended conversations to build trust and gather intelligence about their victims' work environments and security practices. The attackers then deliver RokRAT through various methods, including malicious links shared via Facebook Messenger or email addresses obtained through social media interactions.

RokRAT is a sophisticated remote access trojan that provides APT37 with comprehensive control over infected systems. The malware includes capabilities for file exfiltration, screen capture, keylogging, and remote command execution. Recent variants have incorporated anti-analysis techniques and encrypted communication channels to evade detection by security tools. The trojan can also download additional payloads, allowing attackers to deploy specialized tools based on the specific value of compromised systems.

Organizations can protect against this campaign by implementing strict social media policies for employees handling sensitive information, conducting regular security awareness training focused on social engineering tactics, and deploying endpoint detection and response solutions capable of identifying RokRAT indicators. Network administrators should monitor for suspicious outbound connections to known APT37 command and control infrastructure and implement application whitelisting to prevent unauthorized executable files from running on critical systems.

The CISA Known Exploited Vulnerabilities catalog provides additional context on North Korean threat actor tactics, while the Microsoft Security Response Center offers guidance on securing Windows environments against advanced persistent threats. Security teams should also consider implementing social media monitoring tools to detect fake profiles attempting to connect with organizational personnel and establish clear protocols for verifying the identity of new social media connections, particularly for employees with access to sensitive information.

Frequently Asked Questions

How does APT37 use Facebook to deliver RokRAT malware?+
APT37 creates fake Facebook profiles and sends friend requests to targets, building trust through conversations before delivering RokRAT malware through malicious links. The attackers invest time in creating credible personas to bypass victims' suspicions.
What capabilities does RokRAT malware provide to attackers?+
RokRAT is a remote access trojan that enables file exfiltration, screen capture, keylogging, and remote command execution. Recent variants include anti-analysis techniques and encrypted communications to evade security tools.
How can organizations protect against APT37 Facebook attacks?+
Organizations should implement strict social media policies, conduct security awareness training on social engineering, and deploy endpoint detection solutions. Network monitoring for suspicious connections and application whitelisting also help prevent RokRAT infections.

Discussion

Share your thoughts and insights

Sign in to join the discussion