#KONNI

Daniel Kuhl โœŒ๐Ÿปโ˜ฎ๏ธโ˜•๏ธdaniel1820815@infosec.exchange
2026-01-28

#CheckPoint Research identified an ongoing #phishing campaign associated with #KONNI, a North Koreanโ€“linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated #PowerShell #backdoors.

research.checkpoint.com/2026/k

2026-01-25

AI-Generated Malware Targets Blockchain Sector

The threat group Konni is targeting blockchain developers and engineers
using AI generated malware delivered through social engineering.

Pulse ID: 697556980d7cb28d19682fd8
Pulse Link: otx.alienvault.com/pulse/69755
Pulse Author: cryptocti
Created: 2026-01-24 23:32:40

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BlockChain #CyberSecurity #InfoSec #Konni #Malware #OTX #OpenThreatExchange #RAT #SocialEngineering #bot #developers #cryptocti

2026-01-23
2026-01-23

KONNI Adopts AI to Generate PowerShell Backdoors

Pulse ID: 6972f6c4cf85ed8ad3923afb
Pulse Link: otx.alienvault.com/pulse/6972f
Pulse Author: Tr1sa111
Created: 2026-01-23 04:19:16

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #InfoSec #Konni #OTX #OpenThreatExchange #PowerShell #RAT #bot #Tr1sa111

2026-01-22

KONNI Adopts AI to Generate PowerShell Backdoors

A North Korea-linked threat actor known as KONNI has been observed conducting a phishing campaign targeting software developers and engineering teams, particularly those with blockchain expertise. The campaign uses AI-generated PowerShell backdoors and targets a broader range of countries in the APAC region. The infection chain begins with a Discord-hosted link downloading a ZIP archive containing a PDF lure and a malicious LNK file. The LNK file deploys additional components, including the AI-generated PowerShell backdoor. The backdoor employs various anti-analysis techniques and establishes persistence through scheduled tasks. This campaign demonstrates KONNI's evolution in tactics and tooling, including the adoption of AI-assisted malware development.

Pulse ID: 69726ae65cfcf0a192c03c35
Pulse Link: otx.alienvault.com/pulse/69726
Pulse Author: AlienVault
Created: 2026-01-22 18:22:30

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#APAC #BackDoor #BlockChain #CyberSecurity #Discord #ICS #InfoSec #Konni #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #PDF #Phishing #PowerShell #RAT #ZIP #bot #developers #AlienVault

CyberNetsecIOnetsecio
2026-01-20

๐Ÿ“ฐ North Korean 'Konni' APT Weaponizes Google Ads to Deliver EndRAT Malware

North Korean APT 'Konni' is weaponizing Google Ads URLs in 'Operation Poseidon' to bypass security and deliver the EndRAT malware. The attack uses clever evasion techniques to beat AI filters. โš ๏ธ

๐Ÿ”— cyber.netsecops.io/articles/no

2026-01-19

Operation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanisms

Operation Poseidon is a sophisticated spear-phishing campaign attributed to the Konni APT group. The attackers exploit Google Ads redirection mechanisms to bypass security filters and user awareness. They compromise poorly secured WordPress sites for malware distribution and C2 infrastructure. The campaign uses social engineering tactics, impersonating North Korean human rights organizations and financial institutions. Malware is delivered through LNK files disguised as PDF documents, executing AutoIt scripts that load EndRAT variants. The attackers employ advanced evasion techniques, including email content padding and abuse of legitimate advertising URLs. The campaign demonstrates evolving tactics and infrastructure reuse consistent with previous Konni activities.

Pulse ID: 696d289962926b96a6584416
Pulse Link: otx.alienvault.com/pulse/696d2
Pulse Author: AlienVault
Created: 2026-01-18 18:38:17

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Autoit #CyberSecurity #DRat #Email #Google #GoogleAds #ICS #InfoSec #Konni #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #PDF #Phishing #RAT #RDP #SMS #SocialEngineering #SpearPhishing #Word #Wordpress #bot #AlienVault

2025-11-12

๐Ÿช North Korea-linked #KONNI hackers used KakaoTalk and Google Find Hub to spy on victims and remotely wipe #Android devices in a targeted phishing campaign.

Read: hackread.com/hackers-kakaotalk

#CyberSecurity #NorthKorea #SouthKorea #Spyware #KakaoTalk

2025-11-11

State-Sponsored Remote Wipe Tactics Targeting Android Devices
#Konni
genians.co.kr/en/blog/threat_i

2025-11-11

North Korean hackers are using Googleโ€™s own tools to remotely wipe Android devices and hijack messaging apps. Think your account is safe? Dive into how a single breach can trigger a digital meltdown.

thedefendopsdiaries.com/konni-

#konni
#apt37
#cyberespionage
#androidsecurity
#googlefindhub
#malware
#northkorea
#spearphishing
#infosec

2025-07-21

"์ฃผ์  ๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ์ฝ”๋‹ˆ(Konni)์—์„œ ์ œ์ž‘ํ•œ ์•…์„ฑ์ฝ”๋“œ-์ž๊ธˆ์ถœ์ฒ˜๋ช…์„ธ์„œ.lnk(2025.5.28)" published by Sakai. #Konni, #LNK, #DPRK, #CTI wezard4u.tistory.com/429544

2025-07-07

"๋ถํ•œ ์ฝ”๋‹ˆ(Konni)์—์„œ ์ œ์ž‘ํ•œ ๊ฒƒ์œผ๋กœ ์ถ”์ธก ๋˜๋Š” ์•…์„ฑ์ฝ”๋“œ ์šฐ๋ฆฌ์€ํ–‰ ์‚ฌ์šฉ์ž ๋…ธ๋ฆฐ ์•…์„ฑ์ฝ”๋“œ WooriCard_20231108.html.lnk(2025.5.19)" published by Sakai. #Konni, #LNK, #DPRK, #CTI wezard4u.tistory.com/429529

2025-06-17

"May 2025 APT Group Trends" published by Ahnlab. #Konni, #TA-RedAnt, #DPRK, #CTI asec.ahnlab.com/en/88473/

2025-05-30

"๋ถํ•œ ํ•ดํ‚น ๋‹จ์ฒด ์ฝ”๋‹ˆ(Konni) ์—์„œ ๋งŒ๋“  ์•…์„ฑ์ฝ”๋“œ-๊ฐ€์ƒ์ž์‚ฐ ๊ด€๋ จ ์™ธ๋ถ€ํ‰๊ฐ€์œ„์› ์œ„์ด‰ ์•ˆ๋‚ด.hwp(2025.5.2)" published by Sakai. #Konni, #LNK, #DPRK, #CTI wezard4u.tistory.com/429498

2025-05-26

"๋ถํ•œ ์ฝ”๋‹ˆ(Konni)KB๊ตญ๋ฏผ์€ํ–‰ ์™ธ๊ตญํ™˜๊ฑฐ๋ž˜ ์†Œ๋ช…์ž๋ฃŒ ์ œ์ถœ์„œ ์œ„์žฅํ•œ ์•…์„ฑ์ฝ”๋“œ-์†Œ๋ช…์ž๋ฃŒ ์ œ์ถœ ์•ˆ๋‚ด์„œ(2025.5.13)" published by Sakai. #Konni, #LNK, #DPRK, #CTI wezard4u.tistory.com/429495

2025-05-20

"2025๋…„ 4์›” APT ๊ทธ๋ฃน ๋™ํ–ฅ ๋ณด๊ณ ์„œ" published by Ahnlab. #Konni, #Lazarus, #SyncHole, #Trend, #DPRK, #CTI asec.ahnlab.com/ko/87992/

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst