NokNok is an APT malware chain attributed to an Iranian threat actor, designed for reconnaissance and backdoor deployment on victim systems. The attackers employ targeted phishing emails that impersonate the Royal United Services Institute (RUSI), enticing victims to download a malicious VPN application bearing the RUSI name. Once installed, NokNok leverages bash scripts to establish backdoors and receive server commands, capable of either self-termination or executing additional modules. These modules collect data on running processes, system information, and installed applications, and can also ensure persistence. For secure data transmission, NokNok employs its own encryption, further obfuscated through base64 encoding and segmentation.