Reaper, APT 37, Ricochet Chollima, ScarCruft

Description

Some research organizations link this group to Lazarus Group, Hidden Cobra, Labyrinth Chollima.

(FireEye) Read our report, APT37 (Reaper): The Overlooked North Korean Actor, to learn more about our assessment that this threat actor is working on behalf of the North Korean government, as well as various other details about their operations: • Targeting: Primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare. • Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyberespionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately. • Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations. • Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time. • Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.

Names

NameName-Giver
ReaperFireEye
TEMP.ReaperFireEye
APT 37Mandiant
Ricochet ChollimaCrowdStrike
ScarCruftKaspersky
CeriumMicrosoft
Group 123Talos
Red EyesAhnLab
Geumseong121ESRC
Venus 121ESRC
HermitTencent
InkySquidVolexity
ATK 4Thales
ITG10IBM
Ruby SleetMicrosoft
Crooked PiscesPalo Alto
Moldy PiscesPalo Alto
OsmiumMicrosoft
Opal SleetMicrosoft
TA-RedAntAhnLab

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2012

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Playbook

Other Information

Uuid

be6e7cee-7c2c-4298-941d-01b2106284e6

Last Card Change

2025-06-27