A high-severity threat intelligence report filed on April 16, 2026, flagged a new campaign from North Korea’s APT37 group — the state-sponsored threat actor also known as ScarCruft — using Facebook as the delivery vehicle for RokRAT malware. The tactic represents a measurable shift in how nation-state actors are reaching targets, and it has immediate implications for any small business whose team uses social media professionally.
If your employees talk to recruiters, journalists, or industry contacts on Facebook, LinkedIn, or WhatsApp, this one needs a response.
—
What Is APT37 and Why Small Businesses Should Care
APT37 is a North Korean threat group that has operated under several names — ScarCruft, Reaper, Group123 — since at least 2012. Historically the group focused on strategic targets in South Korea, defense contractors, diplomatic organizations, and human rights groups. Its toolkit has always been more sophisticated than opportunistic cybercrime, featuring custom malware, zero-day exploitation, and patient multi-week reconnaissance.
Here is why this matters outside those traditional targets. Nation-state toolkits do not stay contained. The tools APT37 uses today become the playbooks cybercriminals use against small businesses in 6 to 12 months. The Facebook social engineering technique being documented this week is already spreading — threat analysts expect copycat campaigns to hit accounting firms, law offices, and managed service providers by summer.
Small and mid-sized businesses are attractive secondary targets because they often have privileged access to larger clients, weaker email and social media monitoring, and less budget for cybersecurity awareness training.
—
How the Facebook RokRAT Attack Works
The attack chain APT37 is running is low-tech in its social layer and technically sophisticated in its payload. The sequence that investigators have documented looks like this:
- Reconnaissance. The attacker identifies a target employee — often through LinkedIn — then creates or repurposes a Facebook profile that looks professionally relevant (a recruiter for a legitimate firm, a freelance journalist, or a peer in the same industry).
- Rapport building. The fake account sends a connection request with a plausible reason, then exchanges several days of conversation. The messages are polite, on-topic, and specifically tailored to the victim’s job function.
- Pretext for the payload. The attacker asks the victim to review a document, a slide deck, a job description, or interview questions. The file arrives as a RAR or ZIP archive, occasionally as a Windows shortcut (LNK) file.
- Execution. Opening the archive runs RokRAT, a remote access trojan that installs quietly and begins operating in the background.
- Long-term access. RokRAT performs credential harvesting, screenshot capture, keylogging, and file exfiltration. It hides its command-and-control traffic inside normal-looking connections to cloud services like Dropbox and pCloud — a living-off-the-land technique that most signature-based antivirus tools cannot flag.
Typical dwell time for this class of campaign is more than 180 days. By the time anyone notices, the attackers have credentials, customer records, banking details, and, in many cases, a way back in even after the malware is removed.
—
Why Facebook Is a Dangerous Attack Surface for Businesses
Email security has improved substantially for small businesses over the last five years. email security for small business Most modern email platforms block malicious attachments, flag impersonation attempts, and sandbox suspicious links. Facebook Messenger, LinkedIn InMail, and WhatsApp do none of that with anywhere near the same rigor.
Three factors make social media the weak link in 2026:
- No corporate security layer. Personal social accounts route messages through personal devices and consumer-grade security, not the company’s email gateway or EDR.
- Trust by default. Employees are conditioned to be suspicious of email. Most still treat a friendly LinkedIn connection as low risk.
- File-sharing is normalized. Recruiters, journalists, and consultants legitimately exchange documents over these channels all the time, so a RAR attachment from a “journalist” does not look out of place.
The practical risk is that an employee’s personal Facebook account becomes a delivery channel into your corporate network the moment they open that archive on a work laptop.
—
—
What Small Businesses Should Do This Week
If you have not already, take these three actions now.
1. Publish or refresh a social media security policy. Work documents do not belong in personal DMs. A one-paragraph policy that says “Files related to clients, finances, or operations must be exchanged only over company email or approved business channels” is enough to start. Circulate it, date it, and have your team acknowledge it in writing.
2. Audit your endpoint protection. Signature-based antivirus cannot reliably stop a RokRAT-class payload. At minimum, every company-owned device needs endpoint detection and response (EDR) that watches for behavioral indicators — a Word document that spawns PowerShell, an archive file that extracts and runs a binary, an outbound connection to an unfamiliar cloud storage host. Managed detection and response (MDR) layers a 24/7 human SOC on top of that, which most small businesses cannot staff internally. managed security services for small business
3. Retrain your team on cross-channel phishing. If your last phishing awareness training focused only on email, update it this month. Include examples of LinkedIn recruiter scams, Facebook DM pretexts, and WhatsApp voice-message phishing. Your people are smart — they just have not been trained to be skeptical in the same way on social platforms as they are on email.
The businesses that get hit hardest in 2026 are not the ones with no security. They are the ones whose security was sized for 2022’s threat landscape.
—
The essentials
- APT37 is actively using Facebook to deliver RokRAT malware in an April 2026 campaign.
- The attack relies on patient social engineering — days of conversation before any payload is delivered.
- RokRAT performs credential harvesting, screen capture, and long-term file exfiltration using legitimate cloud services to evade detection.
- Small businesses are at elevated secondary risk because nation-state tactics typically spill into cybercrime playbooks within a year.
- Defense requires endpoint detection, social media usage policy, and awareness training that covers direct messages, not just email.
Questions answered
What is RokRAT malware?
RokRAT is a remote access trojan — a type of malware that gives an attacker full, covert control over an infected device. Once installed, it can steal passwords, capture screenshots, record keystrokes, exfiltrate files, and maintain persistent access for months. It is most strongly associated with APT37, a North Korean state-sponsored group.
How does APT37 deliver RokRAT through Facebook?
APT37 creates or takes over a Facebook profile that looks professionally relevant to the target — often a recruiter or journalist. After days of rapport-building conversation, the attacker sends a document in a RAR or ZIP archive under a plausible pretext, such as asking the target to review interview questions. Opening the archive executes RokRAT.
Is my small business really a target for North Korean hackers?
Probably not as a primary target, but that is the wrong question. Nation-state techniques spread quickly to cybercriminal groups that do target small businesses for credentials, banking access, and customer data. The right question is whether your defenses can catch the techniques, not the specific group.
How much does it cost to defend against APT-style attacks?
A credible defense package for a small business — EDR, email security, multi-factor authentication, and awareness training — typically runs $200 to $450 per month for a 15-person business. Managed detection and response adds another $200 to $500 per month but provides 24/7 monitoring. managed security services cost guide
Can antivirus software detect RokRAT?
Traditional signature-based antivirus often cannot. RokRAT uses living-off-the-land techniques and hides its traffic inside normal cloud service connections. Detection requires behavior-based EDR or MDR that watches for how processes behave, not just what they look like.
Should I block Facebook on work computers?
Blocking social media outright is rarely practical for small businesses where marketing, sales, and recruiting all use these channels. A better approach is to separate personal and work accounts, enforce that work files stay on work channels, and deploy EDR that can catch malicious payloads regardless of which app delivered them.
Worried your current security stack would miss this kind of attack?
Run our free 15-minute security scan and find out where your business is exposed before someone else does.
Recommended Endpoint Security Vendors
DefendMyBusiness partners with a curated network of 400+ vetted providers. Four currently active in our ecosystem for endpoint security:
Lumen
CenturyLink is now Lumen, an enterprise technology platform that enables companies to capitalize on emerging applications that power the 4th Industrial Revolution. Lumen is the fastest, most secure pl
vCom Solutions
vCom empowers channel partners to deliver comprehensive IT lifecycle management solutions that drive value for their customers. Our award-winning, AI-powered platform, vManager, and managed services s
ngenious
Why ngenious?
At ngenious, we believe that digitization is the driving force of the new economy, and that automation and managed services are the most efficient, cost effective and future-proof ro
Ntegrated
At Ntegrated we believe every company deserves to have the best possible work experience, regardless of what they do and where they do it. As the most trusted Tech Enablement Provider for companies he
Unsure which fits your business? We’ll match you with three in 24 hours, no obligation.
Keep going
Book a free 20-minute call
We will map out your options and pull three matched endpoint security providers from our 400+ vendor network. No obligation, no newsletter drip — one call, clear direction.