Konni APT Hijacks KakaoTalk Accounts to Spread Malware

Related

North Korean Hackers Targeted Ethnic Koreans in China With Android Malware

What happened ESET researchers have attributed a supply chain attack...

Telegram Mini Apps Abused for Crypto Scams and Android Malware Delivery

What happened CTM360 researchers have uncovered a large-scale fraud operation...

Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

What happened Check Point researchers have disclosed that VECT 2.0...

Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions

What happened SentinelOne has uncovered Fast16, a Lua-based sabotage malware...

Share

What happened

Researchers uncovered a cyber-espionage campaign linked to the Konni APT group that begins with targeted spear-phishing emails and ultimately hijacks victims’ KakaoTalk messaging accounts to spread malware to additional targets. The emails impersonate official notices appointing recipients as lecturers on North Korean human rights issues, encouraging them to open an attached archive containing a malicious LNK shortcut file disguised as a document. When executed, the file launches a hidden PowerShell script that connects to a command-and-control server and downloads additional malware. After establishing access, attackers remain on the compromised system collecting documents and account information before using the victim’s KakaoTalk PC application to send malicious files to contacts, expanding the campaign through trusted relationships. The attack chain deploys multiple remote access tools including EndRAT, RftRAT, and RemcosRAT, delivered through AutoIt-based scripts. 

Who is affected

Individuals and organizations targeted with the spear-phishing emails and using KakaoTalk messaging are affected, particularly those whose compromised accounts were used to distribute malicious files to contacts. 

Why CISOs should care

The campaign demonstrates how threat actors combine phishing, long-term system access, and hijacked messaging accounts to spread malware through trusted communication channels, making secondary infections harder for victims to detect. 

3 practical actions

  1. Inspect suspicious LNK files in email attachments. Malicious shortcut files can silently launch scripts that download malware. 
  2. Monitor messaging platforms for abnormal file sharing. Compromised KakaoTalk accounts were used to distribute malware to trusted contacts. 
  3. Detect persistence mechanisms on compromised systems. The attackers created scheduled tasks that run frequently to maintain long-term access. 

For more reporting on threats involving credential-stealing malware, explore our latest coverage under the Malware tag.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts