#CheckPoint Research identified an ongoing #phishing campaign associated with #KONNI, a North Korean–linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated #PowerShell #backdoors.
https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/
#Konni hackers target #blockchain engineers with #AI-built #malware
📰 North Korean 'Konni' APT Weaponizes Google Ads to Deliver EndRAT Malware
North Korean APT 'Konni' is weaponizing Google Ads URLs in 'Operation Poseidon' to bypass security and deliver the EndRAT malware. The attack uses clever evasion techniques to beat AI filters. ⚠️ #Konni #APT #Malware #EndRAT #ThreatIntel
🪝 North Korea-linked #KONNI hackers used KakaoTalk and Google Find Hub to spy on victims and remotely wipe #Android devices in a targeted phishing campaign.
Read: https://hackread.com/hackers-kakaotalk-google-find-hub-android-spyware/
North Korean hackers are using Google’s own tools to remotely wipe Android devices and hijack messaging apps. Think your account is safe? Dive into how a single breach can trigger a digital meltdown.
#konni
#apt37
#cyberespionage
#androidsecurity
#googlefindhub
#malware
#northkorea
#spearphishing
#infosec