Also known as: DOGCALL
Category: Malware
Type: Remote access trojan
Platform: Windows
Variants: -
Damage potential: Data theft, espionage, remote control and surveillance, botnet participation.
Overview
RokRAT is a remote access trojan deployed by the North Korean cyber espionage group APT37. It primarily targets South Korean entities through spear-phishing campaigns to take control, spy, and steal any sensitive information. What sets RokRAT apart is its use of legitimate cloud services like Dropbox, Google Drive, and Yandex Disk for command and control (C2) communications, which helps it evade detection by blending in with normal network traffic. Additionally, RokRAT is equipped with advanced anti-analysis techniques and extensive remote control capabilities, including keylogging, screenshot capture, and audio recording.
Possible symptoms
The symptoms of a RokRAT infection might vary, but here are some common signs to watch out for:
- System slowdowns, crashes, and freezes.
- Unusual network traffic.
- Files being moved, modified, or removed without user interaction.
- Mouse cursor moving on its own.
- Programs starting or stopping unexpectedly.
- Webcam or microphone switching on without user interaction.
- Frequent error messages.
- Unexpected pop-ups and notifications.
- Increased CPU or memory usage.
- Disabled security software.
Sources of infection
RokRAT typically spreads through phishing emails with malicious Microsoft Word documents, downloads from malware-hosting websites, malvertising, or peer-to-peer sharing of infected files. In some rare cases, RokRAT can also be downloaded from websites specifically set up or compromised to host malicious files or through peer-to-peer (P2P) file sharing.
Protection
Always browse with caution to protect yourself from RokRAT.
- Do not click on suspicious links or attachments, especially from unknown senders.
- Avoid downloads from unofficial sources.
- Scan downloads for malware, block malware-hosting websites, and stop malicious ads with NordVPN’s Threat Protection feature.
- Install reliable antivirus software and keep it updated.
Removal
If you think you might have RokRAT on your device, you need to act promptly:
- Disconnect your device from the internet to prevent RokRAT from communicating with its command and control server.
- Boot into safe mode.
- Run a full system scan using a reputable antivirus solution.
- Follow the instructions provided by your antivirus software to isolate and remove the malware.
Consult an IT professional if you don’t feel confident handling the removal yourself.