BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Konni Phishing Campaign Hijacks KakaoTalk

Konni group hijacks KakaoTalk to spread multiple RATs via phishing lures.

  • Konni attacks use phishing disguised as official notices to steal credentials.
  • Threat actors hijack victims’ KakaoTalk desktop apps to spread malware to contacts.
  • The campaign uses multiple remote access trojans (RATs) for long-term persistence.
  • The malicious LNK file drops decoy content while secretly executing malware.

South Korean threat intelligence firm Genians has revealed that North Korean hacking group Konni waged a persistent campaign in March 2026, using phishing to hijack victims’ KakaoTalk applications to spread malware. Their report noted attackers first compromised a victim desktop for an extended period. Consequently, the hackers stole internal documents and sensitive information while hiding on the endpoint.

- Advertisement -

The initial spear-phishing email was disguised as a notice appointing the recipient as a North Korean human rights lecturer. However, it contained a malicious ZIP attachment with a Windows shortcut (LNK) file. This file downloaded a next-stage payload, established persistence, and displayed a decoy PDF as a distraction.

The primary malware is a remote access trojan (RAT) named EndRAT, written in AutoIt. Meanwhile, analysis of the infected host uncovered additional scripts for RftRAT and RemcosRAT. This indicates the adversary deployed multiple RAT families for improved resilience, Genians said.

An crucial aspect involves abusing the victim’s KakaoTalk desktop app to distribute malicious ZIP files to specific contacts. Therefore, existing victims became intermediaries for further attacks. The campaign uses filenames disguised as materials introducing North Korea-related content.

This is not the first time Konni has abused KakaoTalk sessions. In November 2025, the group sent malicious payloads to contacts while initiating a remote wipe of Android devices. Consequently, the latest activity represents a multi-stage attack combining long-term persistence, information theft, and account-based redistribution.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Illinois Tech Joins Theta EdgeCloud for AI Research

Illinois Institute of Technology joins Theta EdgeCloud's academic network as its 33rd member institution,...

Lightspark Launches Grid Global Accounts for Firms

Lightspark, a Bitcoin infrastructure company, has launched Grid Global Accounts, an enterprise banking product...

Canaan wins Tether order for custom Bitcoin mining hardware

Canaan secured a new hardware order from Tether for Bitcoin mining modules designed for...

Bitcoin Debate: Ponzi Scheme or Money?

Prominent crypto skeptic and actor Ben McKenzie labels the cryptocurrency sector a "Ponzi scheme"...

Tether, Canaan Unveil Modular Bitcoin Mining Hardware

Tether has announced new modular Bitcoin mining systems developed with partners Canaan Inc. and...

Must Read

Top 10 Best DeFi Tokens to Invest in 2022

Decentralized Finance (Defi), is one of the most talked-about topics in the crypto space alongside NFTs. So if you want to know the best...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading