APT37 Expands Attack Surface Using Social Platforms and Tampered Installers

A new targeted intrusion campaign linked to APT37 highlights how threat actors are evolving their tactics by abusing trusted platforms like Facebook and Telegram, combined with malicious software installers.

This approach reflects a growing trend where attackers blend social engineering with technical compromise to maximize success rates.

How the Attack Unfolds

The campaign relies on a multi stage attack strategy designed to build trust before delivering malicious payloads.

Attackers typically:

  • Initiate contact through social media or messaging platforms
  • Establish credibility using fake or compromised profiles
  • Share links or files disguised as legitimate software
  • Deliver tampered installers embedded with malicious code

Once installed, the malware enables attackers to gain access to the victim’s system and maintain persistence.

Why This Technique Is Effective

By leveraging widely used platforms, attackers take advantage of user trust and familiarity. Social media and messaging apps are often seen as safe communication channels, making users less cautious.

Key factors contributing to the success of these attacks include:

  • Trust in well known platforms
  • Personalized and targeted communication
  • Use of legitimate looking software installers
  • Delayed execution to avoid detection

This combination makes it difficult for traditional security tools to identify threats early.

The Growing Role of Social Engineering in Cyberattacks

The APT37 campaign demonstrates how social engineering continues to play a central role in modern cyber threats. Instead of relying solely on vulnerabilities, attackers manipulate human behavior to gain access.

Common tactics include:

  • Impersonation of trusted individuals or organizations
  • Delivery of malware through seemingly legitimate channels
  • Exploitation of curiosity or urgency
  • Gradual engagement to build trust over time

This shift underscores the importance of user awareness alongside technical defenses.

Industries at Risk

The targeted nature of such campaigns means multiple sectors must remain vigilant.

Financial Services
Financial institutions must protect employees and systems from targeted phishing and malware attacks.

Healthcare
Healthcare organizations must secure endpoints and prevent unauthorized access to sensitive patient data.

Retail and E Commerce
Retail businesses must safeguard customer information and internal systems from compromise.

Manufacturing
Manufacturers must protect operational systems and intellectual property from espionage.

Government and Public Sector
Government agencies remain high value targets for intelligence gathering and data exfiltration.

Strengthening Defense Against Targeted Intrusions

To counter such sophisticated campaigns, organizations must adopt a comprehensive security approach.

Key measures include:

  • Implementing strong endpoint protection and monitoring
  • Verifying software sources before installation
  • Enforcing strict access controls and authentication mechanisms
  • Conducting regular security awareness training
  • Monitoring communication channels for suspicious activity

Combining technical controls with user education is essential to reduce risk.

Conclusion

The APT37 campaign demonstrates how attackers are increasingly combining social engineering with technical exploitation to achieve their. By leveraging trusted platforms and disguising malicious software, they can bypass traditional defenses and target organizations more effectively.

To stay protected, organizations must strengthen both human and technological layers of security, ensuring resilience against evolving cyber threats.

About COE Security

COE Security partners with organizations in financial services, healthcare, retail, manufacturing, and government to secure AI-powered systems and ensure compliance. Our offerings include:

AI-enhanced threat detection and real-time monitoring
Data governance aligned with GDPR, HIPAA, and PCI DSS
Secure model validation to guard against adversarial attacks
Customized training to embed AI security best practices
Penetration Testing (Mobile, Web, AI, Product, IoT, Network & Cloud)
Secure Software Development Consulting (SSDLC)
Customized CyberSecurity Services

COE Security also helps organizations defend against targeted intrusion campaigns and social engineering attacks by securing endpoints, monitoring user activity, and validating software integrity. Our experts assist businesses in identifying malicious communication patterns, preventing unauthorized access, and strengthening defenses against advanced persistent threats.

We support financial institutions in protecting against targeted fraud and intrusion attempts, help healthcare organizations secure sensitive systems and patient data, assist retail businesses in safeguarding customer platforms, strengthen cybersecurity for manufacturing environments and intellectual property, and help government agencies defend against espionage driven attacks.

Through proactive monitoring, advanced threat detection, and user awareness programs, COE Security enables organizations to build resilient and secure environments against evolving cyber threats.

Follow COE Security on LinkedIn for ongoing insights into safe, compliant AI adoption.

Click to read our LinkedIn feature article