Konni APT Hijacks KakaoTalk Accounts to Spread Malware

Related

Female Cybersecurity Leaders to Watch in North Carolina

North Carolina’s cybersecurity leadership strength cuts across state government,...

Female Cybersecurity Leaders to Watch in Minnesota

Minnesota’s cybersecurity leadership strength shows up across agriculture, banking,...

Google Deploys Gemini AI to Monitor Dark Web for Cyber Threats

What happened Google has deployed Gemini AI agents within its...

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

What happened Infinite Campus, a major U.S. K-12 student information...

Dutch Ministry of Finance Discloses Breach Affecting Employees

What happened The Dutch Ministry of Finance confirmed that some...

Share

What happened

Researchers uncovered a cyber-espionage campaign linked to the Konni APT group that begins with targeted spear-phishing emails and ultimately hijacks victims’ KakaoTalk messaging accounts to spread malware to additional targets. The emails impersonate official notices appointing recipients as lecturers on North Korean human rights issues, encouraging them to open an attached archive containing a malicious LNK shortcut file disguised as a document. When executed, the file launches a hidden PowerShell script that connects to a command-and-control server and downloads additional malware. After establishing access, attackers remain on the compromised system collecting documents and account information before using the victim’s KakaoTalk PC application to send malicious files to contacts, expanding the campaign through trusted relationships. The attack chain deploys multiple remote access tools including EndRAT, RftRAT, and RemcosRAT, delivered through AutoIt-based scripts. 

Who is affected

Individuals and organizations targeted with the spear-phishing emails and using KakaoTalk messaging are affected, particularly those whose compromised accounts were used to distribute malicious files to contacts. 

Why CISOs should care

The campaign demonstrates how threat actors combine phishing, long-term system access, and hijacked messaging accounts to spread malware through trusted communication channels, making secondary infections harder for victims to detect. 

3 practical actions

  1. Inspect suspicious LNK files in email attachments. Malicious shortcut files can silently launch scripts that download malware. 
  2. Monitor messaging platforms for abnormal file sharing. Compromised KakaoTalk accounts were used to distribute malware to trusted contacts. 
  3. Detect persistence mechanisms on compromised systems. The attackers created scheduled tasks that run frequently to maintain long-term access. 

For more reporting on threats involving credential-stealing malware, explore our latest coverage under the Malware tag.