Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers exploit Triofox flaw to install remote access tools via antivirus

Konni hacker turns Google’s Find Hub into remote data erasure weapon

Why so many people get hacked by government spyware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Konni hacker turns Google’s Find Hub into remote data erasure weapon
Identity

Konni hacker turns Google’s Find Hub into remote data erasure weapon

userBy userNovember 10, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A North Korean-linked actor known as Konni (also known as Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) is believed to be responsible for a new series of data theft and remote control attacks targeting both Android and Windows devices.

“The attackers posed as psychological counselors and North Korean human rights activists and distributed malware disguised as stress relief programs,” the Genians Security Center (GSC) said in a technical report.

Notable in the attacks targeting Android devices is the attacker’s devastating ability to exploit Google’s asset tracking service Find Hub (formerly known as Find My Device) to remotely reset a victim’s device, thereby leading to unauthorized deletion of personal data. This activity was detected in early September 2025.

This development marks the first time a hacking group has weaponized legitimate administrative capabilities to remotely reset mobile devices. This activity also involves an attack chain in which the attacker approaches the target through a spear-phishing email, gains access to their computer, and leverages the logged-in KakaoTalk chat app session to distribute a malicious payload to their contacts in the form of a ZIP archive.

Spear-phishing emails are said to imitate legitimate organizations such as the Internal Revenue Service, trick recipients into opening malicious attachments, and deliver remote access Trojans like Lilith RAT that can remotely take over compromised machines and deliver additional payloads.

Conni attack flow

“The attackers remained dormant on compromised computers for over a year, spying on them via webcams and operating systems in users’ absence,” GSC said. “In this process, access gained during the initial infiltration allows for system control and additional intelligence gathering, while evasion tactics allow for long-term concealment.”

Once the malware is deployed on a victim’s computer, the attacker can perform internal reconnaissance and monitoring, as well as steal the victim’s Google and Naver account credentials. The stolen Google credentials are used to log into Google’s Find Hub and initiate a remote wipe of the device.

In one case, the attacker was found to have signed into a recovery email account registered with Naver, deleted security alert emails from Google, and emptied the Trash folder in the inbox to hide any trace of their fraud.

DFIR retainer service

The ZIP files propagated via the messaging app contain a malicious Microsoft Installer (MSI) package (‘Stress Clear.msi’) that leverages a valid signature issued to a Chinese company to lend legitimacy to the application. Once launched, it starts running a Visual Basic Script (VB Script) that calls a batch script to perform initial setup and displays a bogus error message about a language pack compatibility issue. Meanwhile, malicious commands are executed in the background.

This includes launching an AutoIt script configured to run every minute via a scheduled task to execute additional commands received from an external server (‘116.202.99’).[.]Although this malware shares some similarities with Lilith RAT, it has been codenamed EndRAT (also known as EndClient RAT by security researcher Ovi Liber) due to the observed differences.

The list of supported commands is:

shellStart, start a remote shell sessionshellStop, stop remote shell updates, send system information list, list drive or root directory goUp, move up one directorydownload, extract file upload, receive file execution, run program on hostDelete, delete files on host

According to Genians, the Konni APT attacker leveraged an AutoIt script to launch Remcos RAT version 7.0.4, which was released by its administrator Breaking Security on September 10, 2025, indicating that the attackers are actively using the new version of the Trojan in their attacks. Quasar RAT and RftRAT, another Trojan used by Kimsuky in 2023, were also observed on victim devices.

“This suggests that this malware is tailored to South Korea-focused operations and requires significant effort to obtain relevant data and conduct detailed analysis,” the South Korean cybersecurity firm said.

Details on Lazarus Group’s new comebacker variant

The disclosure comes as ENKI details that Lazarus Group used the latest version of the Comebacker malware in attacks targeting aerospace and defense organizations using Microsoft Word document lures customized to match espionage. This lure mimics Airbus, Edge Group, and Indian Institute of Technology Kanpur.

When a victim opens the file and enables macros, the infection chain begins, executing the embedded VBA code and delivering a decoy document that is displayed to the user, along with a loader component that launches Comebacker in memory.

CIS build kit

The malware establishes communication with a command and control (C2) server via HTTPS and enters a loop in which it polls for new commands or downloads and executes encrypted payloads.

“The attacker’s use of a very specific decoy document indicates that this is a targeted spear-phishing campaign,” ENKI said in a technical report. “There have been no reports of victims to date, but the C2 infrastructure remains active as of the publication of this article.”

Kimsuky uses new JavaScript dropper

This finding also coincides with the discovery of a new JavaScript-based malware dropper used by Kimsuky in recent operations, indicating that the threat actor is continually refining its malware arsenal. The initial access mechanism by which JavaScript malware is distributed is currently unknown.

Kimsuky JavaScript dropper flow

The starting point for the attack is the first JavaScript file (‘subject.js’). This file connects to adversary-controlled infrastructure to fetch further JavaScript code that can execute commands, extract data, and obtain a third-stage JavaScript payload, creating a scheduled task that launches the first JavaScript file every minute and possibly an empty Word document as a decoy.

“The Word document is empty and has no macros running in the background, so this could be the bait,” Pulse Dive Threat Research said in an analysis published last week.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy so many people get hacked by government spyware
Next Article Hackers exploit Triofox flaw to install remote access tools via antivirus
user
  • Website

Related Posts

Hackers exploit Triofox flaw to install remote access tools via antivirus

November 10, 2025

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 10, 2025

New Browser Security Report Reveals New Threats to Enterprises

November 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers exploit Triofox flaw to install remote access tools via antivirus

Konni hacker turns Google’s Find Hub into remote data erasure weapon

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.