North Korean Hackers Exploit Seoul Intelligence Files in Targeted Cyberattacks

A new large-scale spear-phishing campaign has been uncovered, targeting South Korean government officials and intelligence staff by weaponizing sensitive documents.

According to cybersecurity firm Seqrite, the nation-state group APT37—widely believed to be backed by North Korea—was responsible for the coordinated effort, named Operation HanKook Phantom.

Operation HanKook Phantom: Two Coordinated Campaigns

APT37 deployed two separate phishing waves, each using carefully crafted lures designed to appeal to South Korean institutions and government personnel.

Campaign 1: Seoul Intelligence Newsletter as a Decoy

The first campaign leveraged a legitimate-looking PDF titled “National Intelligence Research Society Newsletter – Issue 52” as bait.

  • The newsletter typically shares insights on national security, labor policies, geopolitics, and North-South Korea relations.
  • Attackers attached a malicious LNK file disguised under the same name.
  • Once executed, the shortcut downloaded and ran a hidden payload, ultimately installing RokRAT, a well-known remote access trojan previously linked to APT37.

Researchers noted the attackers used multiple evasion techniques, including in-memory execution, decoy documents, and hidden exfiltration processes to avoid detection.

Targets included members of prominent South Korean institutions such as:

  • National Intelligence Research Association
  • Korea University
  • Institute for National Security Strategy
  • Kwangwoon University
  • Energy Security and Environment Association

Campaign 2: North Korean Official Statement as Lure

The second campaign weaponized a July 28 public statement by Kim Yo-jong, sister of North Korean leader Kim Jong-un. The document, distributed through the Korean Central News Agency (KCNA), rejected reconciliation efforts with South Korea.

The malicious chain mirrored the first campaign, starting with a booby-trapped LNK file. Once executed, it triggered a fileless attack, downloaded further payloads via PowerShell, and exfiltrated stolen data disguised as PDF uploads.

Targets for this phase included:

  • South Korean government ministries
  • The Ministry of Unification
  • The South Korea–U.S. Military Alliance
  • Asia-Pacific Economic Cooperation (APEC) representatives

APT37’s Growing Threat

APT37—also tracked as ScarCruft, Reaper, RedEyes, InkySquid, and Ricochet Chollima—has been active since at least 2012 and is tied to North Korean state interests.

While historically focused on South Korea, the group has expanded operations globally since 2017, targeting industries such as aerospace, automotive, manufacturing, healthcare, and electronics across Japan, Vietnam, and the Middle East.

Key Takeaways

Seqrite’s analysis of Operation HanKook Phantom demonstrates how APT37 continues to refine its espionage tactics through:

  • Highly tailored spear-phishing campaigns
  • Malicious LNK loaders
  • Fileless PowerShell attacks
  • Covert exfiltration techniques

As North Korean-linked cyber operations evolve, organizations—particularly those in government, defense, and research sectors—must remain vigilant against social engineering tactics and weaponized documents.


Source: https://www.infosecurity-magazine.com/news/north-korea-apt37-spear-phishing