ScarCruft APT: North Korean Hackers Evolve Tactics in 'Artemis' Campaign

North Korean APT ScarCruft (APT37) Deploys New 'Artemis' Campaign with Evolved TTPs

HIGH
January 19, 2026
6m read
Threat ActorCyberattackThreat Intelligence

Related Entities

Products & Tech

Yandex Cloud Hanword Word Processor

Other

North KoreaSouth Korea

Full Report

Executive Summary

The North Korean state-sponsored threat group ScarCruft (also known as APT37, Reaper, or Group123) has been observed conducting a new intelligence-gathering operation named the 'Artemis' campaign. Active between August and November 2025, the campaign demonstrates a clear evolution in the group's tactics, techniques, and procedures (TTPs). The primary targets are likely South Korean entities, consistent with ScarCruft's historical focus. The group has enhanced its operational security by adopting steganography to conceal malware within image files and shifting its command and control (C2) infrastructure to legitimate public cloud services, namely Yandex Cloud. This strategic move makes detection more challenging for network defenders, as malicious traffic is masked within normal cloud service communications.

Threat Overview

The 'Artemis' campaign continues ScarCruft's use of spear-phishing with malicious HWP (Hanword Word Processor) documents as the initial infection vector. These documents are often crafted to impersonate public figures or discuss topics of interest to the target, increasing the likelihood of the victim opening the file and enabling macros.

A key tactical evolution is the use of steganography. The malware's later stages are not delivered as standalone executables but are instead hidden within the pixel data of a legitimate-looking image file (e.g., a PNG or JPG). The initial dropper extracts and executes this hidden payload, a technique designed to bypass signature-based antivirus and file analysis tools.

Perhaps the most significant development is the group's migration of its C2 infrastructure to Yandex Cloud. By using a legitimate and widely used cloud provider for C2, ScarCruft makes it difficult for security teams to simply block IP addresses or domains. Analysis of the infrastructure suggests parts of it have been active since 2023, indicating long-term planning and a patient, persistent approach.

Technical Analysis

The attack chain for the 'Artemis' campaign follows a multi-stage process designed for stealth and persistence.

  1. Initial Access: A spear-phishing email delivers a malicious HWP document (T1566.001 - Spearphishing Attachment).
  2. Execution: The victim opens the HWP file, which exploits a vulnerability or uses embedded macros to execute a dropper payload.
  3. Defense Evasion: The dropper fetches a seemingly benign image file from a remote server. This image contains a hidden, encrypted malware module concealed using steganography (T1027.003 - Steganography).
  4. Payload Execution: The dropper extracts the malicious module from the image, decrypts it, and executes it in memory.
  5. Command and Control: The final payload establishes a C2 channel with the attackers using Yandex Cloud services. This allows the malicious traffic to blend in with legitimate API calls to the cloud provider (T1071.001 - Web Protocols).

MITRE ATT&CK Mapping:

Impact Assessment

As a state-sponsored APT group, ScarCruft's primary objective is espionage and intelligence gathering in support of North Korean strategic interests. A successful compromise could lead to:

  • Theft of sensitive government, diplomatic, or military information.
  • Long-term, persistent access to the target network for ongoing intelligence collection.
  • Compromise of intellectual property from targeted industries.
  • Gaining insight into the political and economic strategies of South Korea and its allies.

Detection & Response

Detecting this evolved threat requires moving beyond simple IOCs.

  • Network Traffic Analysis: Monitor for connections to Yandex Cloud services from hosts that do not normally use them. While blocking all of Yandex Cloud is not feasible, organizations can apply D3FEND's Outbound Traffic Filtering by creating high-fidelity alerts for endpoints that suddenly start communicating with it. Look for anomalous data transfer patterns.
  • Endpoint Forensics: On suspicious endpoints, look for processes that download image files and then perform unusual actions like memory allocation and execution. Use memory forensics to look for injected code that doesn't correspond to a file on disk.
  • File Analysis: Use sandboxing and dynamic analysis (D3FEND's Dynamic Analysis) to inspect HWP files. A file that, upon opening, makes a network call to download an image should be considered highly suspicious.

Mitigation

  1. Email Security: Implement robust email security gateways to block malicious attachments like HWP files, especially for users who do not have a business need to receive them.
  2. Application Hardening: Disable macros in office productivity software. For HWP, use a secure viewer that does not execute active content.
  3. Egress Traffic Filtering: Restrict outbound traffic to only what is necessary for business operations. While blocking entire cloud providers is difficult, you can deny traffic to less common cloud services like Yandex Cloud if there is no legitimate business need.
  4. User Training: Continue to train users to be suspicious of unsolicited attachments, even if they appear to be relevant to their work. This is a crucial component of M1017 - User Training.

Timeline of Events

1
August 1, 2025
The 'Artemis' campaign by ScarCruft begins.
2
November 1, 2025
The initial phase of the observed 'Artemis' campaign concludes.
3
January 19, 2026
This article was published

MITRE ATT&CK Mitigations

Implement strict egress filtering to block connections to unauthorized cloud services like Yandex Cloud if there is no business justification.

Mapped D3FEND Techniques:

Use email security gateways and web proxies to analyze and block malicious file types like HWP and to inspect downloads for suspicious content.

Deploy modern EDR solutions capable of behavioral analysis to detect suspicious process chains, such as an office application spawning a process that makes a network connection.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter ScarCruft's abuse of Yandex Cloud for C2, organizations must implement a robust outbound traffic filtering strategy based on the principle of least privilege. It is not practical to block all major cloud providers, but it is practical to deny connections to those your organization does not use. Conduct an audit to determine which cloud services are required for business operations. Then, configure perimeter firewalls and web proxies to deny all outbound connections to other cloud provider IP ranges and domains by default. For ScarCruft, this means explicitly blocking traffic to *.cloud.yandex.com and associated Yandex IP ranges if your company has no business in Russia or with Yandex. For organizations that may have legitimate traffic, this control should be applied to sensitive network segments where such traffic is not expected. This forces the APT to use more common C2 channels that are easier to monitor or risk being blocked entirely.

The use of steganography requires a more advanced approach to file analysis. Traditional signature-based AV will miss the threat. Security teams should deploy sandboxing technology at the email gateway and for web downloads. When an HWP file is received, the sandbox should open it and monitor its behavior. A key rule to implement is to flag any office document (HWP, DOCX, etc.) that initiates a network connection to download any file, especially an image file. The downloaded image itself should then be subject to analysis. While detecting steganography itself is hard, you can look for the secondary indicators: a process reading the entire image file into memory and then performing actions inconsistent with image viewing, such as spawning new processes, making further network calls, or writing to the registry. This behavioral approach is key to unmasking the hidden payload.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ScarCruftAPT37ReaperNorth KoreaAPTThreat ActorSteganographyYandex Cloud

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading