Article Details

Scrape Timestamp (UTC): 2026-01-26 08:59:46.173

Source: https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html

Original Article Text

Click to Toggle View

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers. The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check Point Research said in a technical report published last week. Active since at least 2014, Konni is primarily known for its targeting of organizations and individuals in South Korea. It's also tracked as Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia. In November 2025, the Genians Security Center (GSC) detailed the hacking group's targeting of Android devices by exploiting Google's asset tracking service, Find Hub, to remotely reset victim devices and erase personal data from them, signaling a new escalation of their tradecraft. As recently as this month, Konni has been observed distributing spear-phishing emails containing malicious links that are disguised as harmless advertising URLs associated with Google and Naver's advertising platforms to bypass security filters and deliver a remote access trojan codenamed EndRAT. The campaign has been codenamed Operation Poseidon by the GSC, with the attacks impersonating North Korean human rights organizations and financial institutions in South Korea. The attacks are also characterized by the use of improperly secured WordPress websites to distribute malware and for command-and-control (C2) infrastructure. The email messages have been found to masquerade as financial notices, such as transaction confirmations or wire transfer requests, to trick recipients into downloading ZIP archives hosted on WordPress sites. The ZIP file comes with a Windows shortcut (LNK) that's designed to execute an AutoIt script disguised as a PDF document. The AutoIt script is a known Konni malware called EndRAT (aka EndClient RAT). "This attack is analyzed as a case that effectively bypassed email security filtering and user vigilance through a spear-phishing attack vector that exploited the ad click redirection mechanism used within the Google advertising ecosystem," the South Korean security outfit said. "It was confirmed that the attacker utilized the redirection URL structure of a domain used for legitimate ad click tracking (ad.doubleclick[.]net) to incrementally direct users to external infrastructure where actual malicious files were hosted." The latest campaign documented by Check Point leverages ZIP files mimicking project requirements-themed documents and hosted on Discord's content delivery network (CDN) to unleash a multi-stage attack chain that performs the following sequence of actions. The exact initial access vector used in the attacks is unknown. The cybersecurity company said there are indications that the PowerShell backdoor was created with the assistance of an AI tool, citing its modular structure, human-readable documentation, and the presence of source code comments like "# <– your permanent project UUID." "Instead of focusing on individual end-users, the campaign goal seems to be to establish a foothold in development environments, where compromise can provide broader downstream access across multiple projects and services," Check Point said. "The introduction of AI-assisted tooling suggests an effort to accelerate development and standardize code while continuing to rely on proven delivery methods and social engineering." The findings coincide with the discovery of multiple North Korea-led campaigns that facilitate remote control and data theft - According to Finnish cybersecurity company WithSecure, the ERP vendor's software has been the target of similar supply chain compromises twice in the past – in 2017 and again in 2024 – to deploy malware families like HotCroissant and Xctdoor. While JelusRAT is written in C++ and supports capabilities to retrieve plugins from the C2 server, StarshellRAT is developed in C# and supports command execution, file upload/download, and screenshot capture. GopherRAT, on the other hand, is based on Golang and features the ability to run commands or binaries, exfiltrate files, and enumerate the file system. "Their targeting and objectives have varied over time; some campaigns have pursued financial gain, while others have focused on stealing information aligned with the regime's priority intelligence needs," WithSecure researcher Mohammad Kazem Hassan Nejad said. "This variability underscores the group's flexibility and its ability to support broader strategic goals as those priorities change over time."

Daily Brief Summary

NATION STATE ACTIVITY // Konni Hackers Target Blockchain Sector with AI-Generated Malware

The North Korean group Konni is using AI-generated PowerShell malware to target blockchain developers in Japan, Australia, and India, expanding beyond its usual targets.

Known for targeting South Korea, Konni has been active since 2014 and is also tracked under various aliases such as Earth Imp and TA406.

Recent campaigns involve spear-phishing emails with links disguised as legitimate Google and Naver ads, leading to the deployment of the EndRAT trojan.

The group uses improperly secured WordPress sites for malware distribution and command-and-control, exploiting ad click redirection mechanisms.

The campaign, named Operation Poseidon, impersonates North Korean human rights organizations and financial institutions to deceive targets.

AI tools have been leveraged to create modular, well-documented PowerShell backdoors, indicating an effort to streamline and standardize malicious code.

This activity aligns with broader North Korean cyber objectives, including financial theft and intelligence gathering, adapting tactics to meet strategic goals.