Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Konni hacker deploys AI-generated PowerShell backdoor against blockchain developers
Identity

Konni hacker deploys AI-generated PowerShell backdoor against blockchain developers

userBy userJanuary 26, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 26, 2026Malware/Endpoint Security

A North Korean threat actor known as Konni has been observed targeting developers and engineering teams in the blockchain space using PowerShell malware generated using artificial intelligence (AI) tools.

Check Point Research said in a technical report released last week that the phishing campaign targeted Japan, Australia and India, highlighting the expansion of adversaries’ targeting beyond South Korea, Russia, Ukraine and European countries.

Konni has been active since at least 2014 and is known to primarily target organizations and individuals in South Korea. Also tracked as Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia.

In November 2025, the Genians Security Center (GSC) revealed a new escalation in the hacking group’s use of Google’s asset tracking service, Find Hub, to target Android devices by remotely resetting victims’ devices and erasing personal data from them.

As recently as this month, Konni was observed distributing spear-phishing emails containing malicious links disguised as benign ad URLs related to Google and Naver advertising platforms, bypassing security filters and delivering a remote access Trojan codenamed EndRAT.

The attack, which impersonated a North Korean human rights organization and a South Korean financial institution, was codenamed “Operation Poseidon” by the GSC. This attack also features the use of improperly secured WordPress websites for malware distribution and command-and-control (C2) infrastructure.

cyber security

The email message was found to be disguised as a financial notification, such as a transaction confirmation or wire transfer request, to trick the recipient into downloading a ZIP archive hosted on a WordPress site. The ZIP file comes with a Windows shortcut (LNK) designed to run an AutoIt script disguised as a PDF document. The AutoIt script is a known Konni malware called EndRAT (also known as EndClient RAT).

“This attack has been analyzed as an incident that effectively bypassed email security filtering and user vigilance through a spear-phishing attack vector that exploited the ad click redirection mechanism used within Google’s advertising ecosystem,” the South Korean security group said.

“We observed that the attacker leveraged the redirect URL structure (ad.doubleclick) of a domain used for legitimate ad click tracking.[.]net) to gradually lure the user to the external infrastructure where the actual malicious file is hosted. ”

The latest campaign documented by Check Point mimics a document themed around project requirements and leverages a ZIP file hosted on Discord’s Content Delivery Network (CDN) to unleash a multi-stage attack chain that performs the following series of actions: The exact initial access vector used in the attack is unknown.

The ZIP archive contains a PDF decoy and an LNK file. The shortcut file launches an embedded PowerShell loader that extracts two additional files, a Microsoft Word lure document and a CAB archive, and displays them as Word documents as a distraction mechanism. The shortcut file extracts the contents of a CAB archive that contains a PowerShell backdoor, two batch scripts, and an executable file used for User Account Control (UAC) bypass. The first batch script is used to prepare the environment and establish persistence using a scheduled schedule. The backdoor performs its tasks, stages the backdoor for execution, and then removes itself from disk to reduce forensic visibility. The PowerShell backdoor runs a series of anti-analysis and sandbox evasion checks, proceeds to profile the system, and attempts to escalate privileges using FodHelper UAC bypass techniques. The backdoor performs a cleanup of previously removed UAC bypass executables, configures Microsoft Defender exclusions for ‘C:\ProgramData’, and executes a second batch. The backdoor drops SimpleHelp, a legitimate remote monitoring and management (RMM) tool for persistent remote access, communicates with a C2 server protected by a cryptographic gate intended to block non-browser traffic, periodically sends host metadata, and executes PowerShell code returned by the server.

The cybersecurity firm said there are indications that the PowerShell backdoor was created with the help of AI tools, citing its modular structure, human-readable documentation, and the presence of source code comments like “# <– Persistent Project UUID."

“Rather than focusing on individual end users, the goal of the campaign was to establish a foothold in the development environment, with the compromise providing broader downstream access across multiple projects and services,” Check Point said. “The introduction of AI-assisted tools signals an effort to accelerate development and standardize code while continuing to rely on proven delivery methods and social engineering.”

cyber security

This finding is consistent with the discovery of multiple North Korean-led campaigns facilitating remote control and data theft.

A spear phishing campaign that uses a JavaScript encoded (JSE) script that mimics a Hangul Word Processor (HWPX) document and a government-themed decoy file to deploy a Visual Studio Code (VS Code) tunnel to establish remote access A phishing campaign that distributes LNK files disguised as PDF documents to detect virtual and malware analysis environments and launch a PowerShell script that delivers a remote access Trojan called MoonPeak Campaign The campaign, which is believed to have been carried out by Andariel in 2025, targeted an anonymous European entity in the legal sector to deliver TigerRAT, as well as compromise the update mechanism of a South Korean enterprise resource planning (ERP) software vendor to distribute three new Trojans to downstream victims, including StarshellRAT, JelusRAT, and GopherRAT.

According to Finnish cybersecurity company WithSecure, the ERP vendor’s software has been targeted in similar supply chain breaches twice in the past (in 2017 and again in 2024) to deploy malware families such as HotCroissant and Xctdoor.

JelusRAT is written in C++ and supports the ability to retrieve plugins from a C2 server, while StarshellRAT is developed in C# and supports running commands, uploading/downloading files, and capturing screenshots. GopherRAT, on the other hand, is based on Golang and has the ability to run commands or binaries, extract files, and enumerate file systems.

“Their targets and objectives have changed over time, with some campaigns pursuing financial gain, while others focused on stealing information in line with the regime’s priority intelligence needs,” said Mohammad Kazem Hassan Nejad, a researcher at WithSecure. “This volatility highlights the group’s flexibility and ability to support broader strategic objectives as priorities change over time.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSecuring digital identity through biometric authentication
Next Article AI in Healthcare: Better Diagnosis and Care
user
  • Website

Related Posts

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

February 4, 2026

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

February 4, 2026

Orchid Security brings continuous identity observability to enterprise applications

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Orchid Security brings continuous identity observability to enterprise applications

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.