BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Konni Phishing Campaign Hijacks KakaoTalk

Konni group hijacks KakaoTalk to spread multiple RATs via phishing lures.

  • Konni attacks use phishing disguised as official notices to steal credentials.
  • Threat actors hijack victims’ KakaoTalk desktop apps to spread malware to contacts.
  • The campaign uses multiple remote access trojans (RATs) for long-term persistence.
  • The malicious LNK file drops decoy content while secretly executing malware.

South Korean threat intelligence firm Genians has revealed that North Korean hacking group Konni waged a persistent campaign in March 2026, using phishing to hijack victims’ KakaoTalk applications to spread malware. Their report noted attackers first compromised a victim desktop for an extended period. Consequently, the hackers stole internal documents and sensitive information while hiding on the endpoint.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

The initial spear-phishing email was disguised as a notice appointing the recipient as a North Korean human rights lecturer. However, it contained a malicious ZIP attachment with a Windows shortcut (LNK) file. This file downloaded a next-stage payload, established persistence, and displayed a decoy PDF as a distraction.

The primary malware is a remote access trojan (RAT) named EndRAT, written in AutoIt. Meanwhile, analysis of the infected host uncovered additional scripts for RftRAT and RemcosRAT. This indicates the adversary deployed multiple RAT families for improved resilience, Genians said.

An crucial aspect involves abusing the victim’s KakaoTalk desktop app to distribute malicious ZIP files to specific contacts. Therefore, existing victims became intermediaries for further attacks. The campaign uses filenames disguised as materials introducing North Korea-related content.

This is not the first time Konni has abused KakaoTalk sessions. In November 2025, the group sent malicious payloads to contacts while initiating a remote wipe of Android devices. Consequently, the latest activity represents a multi-stage attack combining long-term persistence, information theft, and account-based redistribution.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Banks tap ZKsync for private deposit token network

Cari Network, led by former US Comptroller Gene Ludwig, has selected ZKsync's Prividium to...

War Costs Fuel BRICS Unit Threat to Dollar Dominance

The daily cost of the US-Iran conflict, estimated between $800 million and $2 billion,...

Crypto.com Partners With Korean Payment Giant for Traveler Payments

crypto.com partners with South Korea's KG Inicis to enable crypto payments for foreign travelers...

US Dollar Surges as Bullish Bets Hit Highest Since 2022

Bullish bets on the US Dollar in the options market have surged to their...

Musk Expert: $38M Was 75% Of OpenAI Non-Profit Value

Elon Musk vows to donate any legal victory proceeds from his lawsuit against OpenAI...

Must Read

7 Best NFT Marketplaces for Every Need

Open Sea | Pianity | Foundation | Magic Eden | SuperRare | Rarible | Theta Drop | Other Platforms | About NFTs | FAQ...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading