"Public meetings are not press conferences!" CM Pinarayi Vijayan doubles down on his "Go ask that at home" comment, stating that 'natural reactions' follow when public decorum is ignored. Addressing the Konni incident from Idukki, the CM dismissed criticisms regarding his composure and reminded the audience that those uninterested in the speech are free to leave. https://english.mathrubhumi.com/news/kerala/go-ask-that-at-home-a-natural-reaction-public-meetings-have-decorum-kerala-cm-pinarayi-vijayan-watch-hi4cs1jf?utm_source=dlvr.it&utm_medium=mastodon #PinarayiVijayan #KeralaPolitics #LDF2026 #Konni #KeralaElections

Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign

The Konni Group conducted a sophisticated multi-stage attack campaign, initiating with a spear-phishing email disguised as a North Korean human rights lecturer appointment. The attack progressed through execution of a malicious LNK file, installation of remote access malware, and long-term persistence for data theft. A key feature was the unauthorized access to victims' KakaoTalk PC applications, used to distribute additional malicious files to selected contacts. The campaign employed multiple RAT families, including EndRAT, RftRAT, and RemcosRAT, with a distributed C2 infrastructure across Finland, Japan, and the Netherlands. The threat actor's tactics included trust-based propagation, account session abuse, and modular payload deployment, highlighting the need for advanced behavior-based detection and multi-layered defense strategies.

Pulse ID: 69ba831f2287b29db4e4645e
Pulse Link: https://otx.alienvault.com/pulse/69ba831f2287b29db4e4645e
Pulse Author: AlienVault
Created: 2026-03-18 10:49:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DRat #DataTheft #Email #Finland #ICS #InfoSec #Japan #Konni #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #RAT #Remcos #RemcosRAT #Rust #SpearPhishing #TheNetherlands #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Konni Hijacks KakaoTalk Accounts in Spear Phishing Malware Campaign

Pulse ID: 69b90cf1f7d81be697e032b4
Pulse Link: https://otx.alienvault.com/pulse/69b90cf1f7d81be697e032b4
Pulse Author: cryptocti
Created: 2026-03-17 08:12:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Konni #Malware #OTX #OpenThreatExchange #Phishing #SpearPhishing #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

#CheckPoint Research identified an ongoing #phishing campaign associated with #KONNI, a North Korean–linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated #PowerShell #backdoors.

https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/

KONNI Adopts AI to Generate PowerShell Backdoors - Check Point Research

North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware

Check Point Research
Konni hackers target blockchain engineers with AI-built malware

The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.

BleepingComputer
North Korea–linked KONNI uses AI to build stealthy malware tooling

Check Point links an active phishing campaign to North Korea–aligned KONNI, using an AI-written PowerShell backdoor.

Security Affairs
KONNI Adopts AI to Generate PowerShell Backdoors - Check Point Research

North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware

Check Point Research

📰 North Korean 'Konni' APT Weaponizes Google Ads to Deliver EndRAT Malware

North Korean APT 'Konni' is weaponizing Google Ads URLs in 'Operation Poseidon' to bypass security and deliver the EndRAT malware. The attack uses clever evasion techniques to beat AI filters. ⚠️ #Konni #APT #Malware #EndRAT #ThreatIntel

🔗 https://cyber.netsecops.io/articles/north-korean-apt-konni-abuses-google-ads-in-operation-poseidon/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

North Korean 'Konni' APT Weaponizes Google Ads to Deliver EndRAT Malware

The North Korean APT group Konni is abusing Google's advertising platform in a campaign dubbed "Operation Poseidon" to deliver the EndRAT malware, using sophisticated evasion techniques.

CyberNetSec.io

🪝 North Korea-linked #KONNI hackers used KakaoTalk and Google Find Hub to spy on victims and remotely wipe #Android devices in a targeted phishing campaign.

Read: https://hackread.com/hackers-kakaotalk-google-find-hub-android-spyware/

#CyberSecurity #NorthKorea #SouthKorea #Spyware #KakaoTalk

Hackers Use KakaoTalk and Google Find Hub in Android Spyware Attack

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

State-Sponsored Remote Wipe Tactics Targeting Android Devices
#Konni
https://www.genians.co.kr/en/blog/threat_intelligence/android
State-Sponsored Remote Wipe Tactics Targeting Android Devices

The Konni APT campaign has caused damage by remotely resetting Google Android-based devices, resulting in the unauthorized deletion of personal data.