Scarcruft (APT37) ChinopuNK Campaign Targets South Korea with Ransomware
Summary
Hide β²
Show βΌ
Scarcruft (APT37), a North Korean threat group, has launched a new campaign targeting South Korea. The campaign, attributed to the ChinopuNK subgroup, uses a combination of infostealers, backdoors, and ransomware. The attacks began in July 2025, with phishing emails disguised as postal code updates. The malware includes NubSpy, a backdoor using PubNub for command-and-control, and VCD ransomware, which appends a .vcd extension to encrypted files. The ransomware is tailored to specific targets, indicating a strategic approach to espionage and financial gain. The campaign highlights a shift in North Korean tactics, combining espionage with financially motivated attacks. This multifaceted approach allows for simultaneous intelligence gathering and short-term financial or disruptive outcomes.
Timeline
-
14.08.2025 03:00 π° 1 articles
Scarcruft (APT37) ChinopuNK Campaign Targets South Korea with Ransomware
In July 2025, the ChinopuNK subgroup of Scarcruft (APT37) launched a campaign against South Korea. The campaign uses phishing emails disguised as postal code updates to deliver a combination of infostealers, backdoors, and ransomware. The malware includes NubSpy, a backdoor using PubNub for command-and-control, and VCD ransomware, which is tailored to specific targets. The ransomware drops notes in both English and Korean, indicating a strategic approach to espionage and financial gain.
Show sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
Information Snippets
-
Scarcruft (APT37) is a North Korean threat group known for financially motivated cyberattacks.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
ChinopuNK, a subgroup of Scarcruft, is targeting South Korea with a new campaign.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
The campaign began in July 2025, with possible earlier activity dating back to February.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
The attacks use phishing emails disguised as postal code updates.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
The malware includes NubSpy, a backdoor using PubNub for command-and-control.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
The campaign deploys at least nine separate malware tools, including infostealers, backdoors, and ransomware.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
The ransomware, named VCD, appends a .vcd extension to encrypted files and is tailored to specific targets.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
VCD ransomware drops ransom notes in both English and Korean.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
-
The campaign represents a shift in North Korean tactics, combining espionage with financially motivated attacks.
First reported: 14.08.2025 03:00π° 1 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware β www.darkreading.com β 14.08.2025 03:00
Similar Happenings
APT41 Targets U.S. Trade Officials in Cyber Espionage Campaign
The House Select Committee on China has issued a warning about ongoing cyber espionage campaigns by China-linked APT41 targeting U.S. trade officials and related organizations. The attacks involve phishing emails impersonating U.S. officials to steal sensitive information. The campaign coincides with contentious U.S.-China trade negotiations. The threat actors exploit software and cloud services to cover their tracks. The attacks aim to steal valuable data and gain unauthorized access to systems. The committee has noted similar tactics used in previous campaigns, including a January 2025 spear-phishing attempt targeting committee staffers. The FBI is investigating the ongoing cyber espionage campaign. APT41 has been known to conduct financially motivated activities in addition to state-sponsored espionage. The group has targeted various sectors, including logistics, utilities, healthcare, high-tech, and telecommunications. The committee recommends user awareness phishing training, mandatory multifactor authentication, FIDO keys, and appropriate email gateway and endpoint security tools to mitigate such attacks.
Axios Abuse and Salty 2FA Kits in Microsoft 365 Phishing Campaigns
Threat actors are leveraging HTTP client tools like Axios and Microsoft's Direct Send feature to execute advanced phishing campaigns targeting Microsoft 365 environments. These campaigns have demonstrated a 70% success rate, bypassing traditional security defenses and exploiting authentication workflows. The attacks began in July 2025 and have targeted executives and managers in various sectors, including finance, healthcare, and manufacturing. The phishing campaigns use compensation-themed lures to trick recipients into opening malicious PDFs containing QR codes that direct users to fake login pages. Additionally, a phishing-as-a-service (PhaaS) offering called Salty 2FA is being used to steal Microsoft login credentials and bypass multi-factor authentication (MFA). The Salty2FA kit includes advanced features such as subdomain rotation, dynamic corporate branding, and sophisticated evasion tactics to enhance its effectiveness and evade detection. Salty2FA activity began gaining momentum in June 2025, with early traces possibly dating back to MarchβApril 2025. The campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily. Salty2FA targets industries including finance, energy, telecom, healthcare, government, logistics, IT consulting, education, construction, chemicals, industrial manufacturing, real estate, consulting, metallurgy, and more.
Kazakhstan's KazMunayGas Phishing Test Mistaken for Noisy Bear Campaign
Kazakhstan's state-owned oil and gas company KazMunayGas conducted a phishing test in May 2025, which was initially misinterpreted as a cyber espionage campaign by a new threat group named Noisy Bear. The test involved phishing emails targeting KazMunayGas employees with fake documents related to internal communications and policy updates. The phishing emails were sent from a compromised internal email address and included a ZIP attachment with a Windows shortcut (LNK) downloader, a decoy document, and a README.txt file with instructions. The campaign was designed to mimic official internal communications and included themes such as policy updates, internal certification procedures, and salary adjustments. The phishing test was conducted to train employees on identifying and responding to phishing attempts. However, it was mistakenly reported as a cyber espionage campaign by Seqrite Labs, which attributed the activity to a new threat group tracked as Noisy Bear. The threat actor was believed to be of Russian origin and had been active since at least April 2025. The misinterpretation led to speculation about the involvement of a new threat group and the use of sophisticated malware, including a PowerShell loader dubbed DOWNSHELL and a DLL-based implant. The threat actor used a compromised email address belonging to a KazMunayGas finance department employee to send phishing emails. The phishing emails impersonated mundane company business, including reviewing work schedules, incentive systems, and wages. The phishing emails contained a ZIP file with a decoy document and a shortcut (LNK) file named "Salary Schedule.lnk." The LNK file downloaded a batch script, which retrieved the attackers' PowerShell loader named DownShell. DownShell consists of two scripts: one for anti-analysis by undermining the Windows Antimalware Scan Interface (AMSI), and another for CreateRemoteThread Injection to establish a reverse shell. Noisy Bear used a sanctioned Russian bulletproof hosting provider, Aeza Group, to maintain its infrastructure. The threat activity carries geopolitical implications, targeting Kazakhstan's largest oil and gas company, which is state-owned and a significant economic entity. Seqrite Labs found infrastructure and tooling overlaps across other Central Asian attacks, indicating a broader campaign. The incident highlights the importance of clear communication and coordination between cybersecurity researchers and organizations to avoid misinterpretations and ensure accurate reporting of cyber threats.
SVG Files Used to Deploy Phishing Pages in Colombian Judicial System Impersonation Campaign
A malware campaign leveraging SVG files to deploy Base64-encoded phishing pages impersonating the Colombian judicial system has been identified. The SVG files, distributed via email, execute JavaScript payloads to inject phishing pages and download ZIP archives. The campaign involves 523 unique SVG files that have evaded detection by antivirus engines. The earliest sample dates back to August 14, 2025. The campaign highlights the evolving tactics used by threat actors to bypass security measures and target macOS systems with information stealers like Atomic macOS Stealer (AMOS). This campaign also coincides with broader trends in cyber threats targeting macOS and gamers.
GhostRedirector Compromises 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
GhostRedirector, a previously undocumented threat cluster, has compromised at least 65 Windows servers primarily in Brazil, Thailand, and Vietnam. The attacks, active since at least August 2024, deployed the Rungan backdoor and Gamshen IIS module. Rungan executes commands on compromised servers, while Gamshen manipulates search engine results for SEO fraud. The threat actor targets various sectors, including education, healthcare, technology, transportation, insurance, and retail, using SQL injection vulnerabilities for initial access. The group is assessed with medium confidence to be China-aligned. The operation involves using PowerShell to download malware tools and exploits like EfsPotato and BadPotato for privilege escalation.