In March 2025, cybersecurity researchers at Genians Security Center (GSC) flagged a sophisticated spear phishing campaign orchestrated by the North Korea-linked threat actor APT37.
This operation, dubbed “Operation ToyBox Story,” marks a significant evolution in the group’s tactics: using fake academic conference invites and Dropbox-hosted ZIP archives to deliver highly obfuscated, fileless malware via malicious Windows shortcut (LNK) files.
APT37, also known as ScarCruft, is notorious for espionage targeting governments, activists, and think tanks related to the Korean Peninsula. In this latest campaign, attackers sent emails pretending to be South Korean academics or security experts.
The emails contained Dropbox links or attachments purporting to be conference invitations or sensitive documents about North Korean troop movements in Russia.
The attached ZIP archives held LNK files engineered to look benign sometimes even using icons from legitimate services like Naver Mail to strengthen the ruse.
Upon extraction and execution, the LNK file launches a multi-stage infection chain:
%Temp% directory.LNK File Structure and Obfuscation
The core malicious LNK file is designed with command-line arguments to launch powershell.exe in hidden mode. To avoid detection, the attackers break up critical filenames in the batch script and reconstruct them at execution time:
textset bat=%temp%\toy03.b^a^t
powershell -windowstyle hidden -executionpolicy bypass -file %bat%
The batch file then loads further staged scripts from the %Temp% folder (e.g., toy02.dat and toy01.dat). Each stage relies on PowerShell and obfuscation to transfer and execute code solely in memory.
Decoy Documents
To disguise activity, the first visible action is opening a legitimate document often a news-style letter or conference invite, matching the lure’s email content. This helps delay suspicion while the background infection proceeds.
Fileless Execution Tactics
The process for dynamically loading the final PE executable (RoKRAT) includes:
This “fileless” approach allows the attack to occur without writing a traditional .exe file to disk, bypassing signature-based AV solutions.
RoKRAT, the final dropped malware, gathers detailed system information, takes real-time screenshots, scans removable drives, and executes commands received from the attackers’ control server. Data is bundled, obfuscated with a hardcoded value, and then encrypted via AES (with the AES key further encrypted by RSA for extra security).
Example Data Encryption Flow:
cuint32_t fixed_val = 0xFADEADBA;
xor_obfuscate(collected_data, random_key);
aes_cbc_encrypt(collected_data, aes_key);
rsa_encrypt(aes_key, rsa_pubkey);
For command-and-control (C2), RoKRAT uses legitimate cloud storage APIs as communication channels—a technique called “Living off Trusted Sites” (LoTS).
Common cloud providers abused include Dropbox, pCloud, and Yandex Disk. Exfiltration and command reception happen over authenticated API calls with stolen or fake credentials.
Sample Dropbox API Usage:
https://content.dropboxapi.com/2/files/uploadhttps://content.dropboxapi.com/2/files/downloadhttps://api.dropboxapi.com/2/files/deleteGSC analysts discovered active access tokens linked to Russian Yandex email accounts, used to authorize Dropbox API calls and mask attacker identities.
This campaign underlines a growing trend: APTs like APT37 leveraging social engineering, fileless malware delivery, and trusted third-party services to bypass conventional defenses. Security teams must prioritize:
As attackers increasingly “live off the cloud,” defenders must boost monitoring of legitimate cloud application usage and augment controls around cloud authentication and access tokens.
For high-risk organizations, proactive threat hunting and EDR solutions capable of dissecting PowerShell command lines, process trees, and cloud API behaviors are now vital to maintaining operational security.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…