APT37
apt37 · primary source: MITRE · first observed 2011
KP · DPRKState-sponsoredModerate confidencelast cited Feb 19, 2018 · 8y ago
DPRK state-sponsored actor publicly attributed to North Korea's Ministry of State Security (MSS). Conducts espionage against South Korean public and private sector targets and, to a lesser extent, Japan, Vietnam, and the Middle East. Known for early adoption of zero-day exploits and the use of decoy documents exploiting Hangul Word Processor.
Aliases
ReaperOtherScarCruftOtherRicochet ChollimaCrowdStrikeInkySquidOtherOpal SleetMicrosoft
Motivations
espionage
Target sectors
governmentdefensemediaacademiadissidents
Target countries
KRJPVNKWBH
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
1 eventIndicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | family · BLUELIGHT BLUELIGHT backdoor sample published by Volexity on 17 August 2021 in the 'InkySquid' blog. BLUELIGHT uses the Microsoft Graph API (OneDrive appfolder) for C2 and was deployed via IE / legacy-Edge zero-days CVE-2020-1380 and CVE-2021-26411 from a strategic web compromise of dailynk.com. Volexity attributes InkySquid to APT37 / ScarCruft. | Aug 16, 2021 | Volexity |
| Domain | family · BLUELIGHT APT37 / InkySquid C2 root. Subdomains ui.jquery.services and storage.jquery.services served BLUELIGHT loader scripts via a strategic web compromise of South Korean news site dailynk.com starting April 2021. Reported by Volexity. | Mar 31, 2021 | Volexity |
| SHA-256 | family · RokRAT RokRAT (DOGCALL) backdoor sample documented by Cisco Talos in 'ROKRAT Reloaded' (November 2017). RokRAT abuses legitimate cloud services (pCloud, Box, Dropbox, Yandex) as C2 and is consistently attributed to APT37 / ScarCruft / Reaper / Group 123 (DPRK MSS). | Nov 15, 2017 | Cisco Talos |
Related actors
shared ATT&CK techniques- CN · ChinaElderwood3 shared techniques
- IR · IranAPT392 shared techniques
- RU · RussiaGamaredon2 shared techniques
- KP · DPRKLazarus Group2 shared techniques
- CN · ChinaMustang Panda2 shared techniques
- CN · ChinaNaikon2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). APT37 — actor profile. Retrieved from https://threatintel.local/actors/apt37
latest cited activity · 2018-02-20 · 3 cataloged indicators