APT37 Is Making Friends on Facebook to Deliver RokRAT: Inside a Slow-Burn Social Engineering Campaign | Lorikeet Security Skip to main content
Back to Blog

APT37 Is Making Friends on Facebook to Deliver RokRAT: Inside a Slow-Burn Social Engineering Campaign

Lorikeet Security Team April 14, 2026 8 min read

North Korea's APT37 — also tracked as ScarCruft — has retooled its social engineering playbook for Facebook. Threat researchers this month attributed a multi-stage campaign to the group in which operators approach targets by sending a friend request, build rapport over days or weeks, and eventually deliver a payload that installs RokRAT, a long-running remote access trojan in the APT37 arsenal.

It is a deeply unglamorous technique. It is also working.


The campaign structure

The operation is notable less for its malware than for its patience. Reported stages:

  1. Persona construction. Operators maintain Facebook profiles that look like journalists, researchers, or fellow professionals in the target's field — North Korean affairs, think tanks, policy shops, defense suppliers.
  2. Friend request. Sent cold. If accepted, the operator engages in normal-looking conversation on topics of mutual interest.
  3. Trust milestone. After a stretch of benign interaction, the operator proposes a collaboration — a draft report, an interview request, a shared document.
  4. Payload delivery. The "document" is delivered as a LNK or macro-laden file, often via an archive hosted on a cloud service the target already trusts.
  5. RokRAT deployment. On execution, a multi-stage loader retrieves RokRAT, which establishes C2 and quietly begins exfiltration.

Why it works: Every security training tells users to distrust unexpected emails from strangers. Almost none tells them to distrust a Facebook friend they have been chatting with for three weeks.


Who APT37 targets

Historically, ScarCruft has focused on South Korean government, defense, media, and NGOs working on North Korea. In 2025–2026 the target set has widened to include:

If your organization employs regional experts, lobbyists, or reporters who could plausibly receive a "can we chat about your recent article" message from a stranger, you are inside the target population.


RokRAT in brief

RokRAT is not a new tool. It has been associated with APT37 since 2017 and has been continuously updated. Recent variants:

Detection on endpoint alone is meaningful but insufficient — the high-signal moment to catch RokRAT is the initial delivery, and that signal is social-first, not technical-first.


Defensive response

For the security team

For the individual target

The uncomfortable truth: APT37's Facebook tradecraft succeeds because it exploits ordinary human sociability, not a software vulnerability. No patch fixes it. The defense is a target-population awareness program, not a control.


Why this matters beyond APT37

Social-graph targeting is no longer a nation-state curiosity. Ransomware affiliates, fraud crews, and extortion groups have all started running similar plays on LinkedIn, Discord, and Telegram, often enriched with AI-generated personas. If your threat model still treats "unsolicited email" as the only social engineering vector, it is already outdated.

Test Your Defenses Against Real Tradecraft

Lorikeet's penetration testing includes targeted social engineering assessments that mirror real nation-state and criminal tradecraft — so you find the gap before APT37 does.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!