Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Konni introduced EndRAT through spear phishing and used KakaoTalk to spread malware

Passwords are disappearing and biometrics will replace them

Putting the North East of England on the UK space map

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Konni introduced EndRAT through spear phishing and used KakaoTalk to spread malware
Identity

Konni introduced EndRAT through spear phishing and used KakaoTalk to spread malware

By March 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 17, 2026Threat Intelligence/Endpoint Security

North Korean attackers have been observed sending phishing attacks to compromise targets, gain access to victims’ KakaoTalk desktop applications, and distribute malicious payloads to specific contacts.

South Korean threat intelligence firm Genians attributes this activity to a hacker group called Konni.

“Initial access was achieved through a spear-phishing email disguised as a notification appointing the recipient as a human rights lecturer in North Korea,” Jennians Security Center (GSC) said in an analysis.

“After a successful spear-phishing attack, the victim executed a malicious LNK file, which resulted in infection with remote access malware. The malware remained hidden on the victim’s endpoint for an extended period of time, persisting, and exfiltrating internal documents and sensitive information.”

The attacker allegedly remained on the compromised host for an extended period of time, used unauthorized access to siphon internal documents, and utilized the KakaoTalk application to selectively propagate malware to specific contacts.

This attack is notable in that it exploits the trust associated with compromised victims to deceive and entrap further targets. This isn’t the first time Konni has embraced messaging apps as a distribution vector. In November 2025, the hacker group was discovered to be abusing signed-in KakaoTalk chat app sessions to send malicious payloads to victim contacts in the form of ZIP archives, while simultaneously initiating remote wipes of Android devices using stolen Google credentials.

The starting point for the latest attack campaign is a spear phishing email used as a ruse to trick recipients into opening a ZIP file attachment containing a Windows shortcut (LNK). Once executed, the LNK file downloads the next stage payload from an external server, uses a scheduled task to establish persistence, and finally executes the malware. At the same time, it displays a PDF decoy document to the user as a distraction mechanism.

The downloaded malware written with AutoIt is a remote access Trojan (RAT) named EndRAT (also known as EndClient RAT) that allows operators to remotely take over compromised hosts through features such as file management, remote shell access, data transfer, and persistence.

Further analysis of the infected hosts revealed the presence of various malicious artifacts, including AutoIt scripts for RftRAT and RemcosRAT. This indicates that the attacker deemed the victim valuable enough to remove multiple RAT families to improve resiliency.

A key aspect of this attack is that the threat actor exploits the victim’s KakaoTalk application installed on the infected system, distributing malicious files in the form of ZIP files to other individuals in their contact list and deploying the same malware. This essentially turns existing victims into vectors for further attacks.

“This campaign is assessed to be a multi-stage campaign that goes beyond simple spear phishing, combining long-term persistence, information theft, and account-based redistribution,” Jennians said. “The attacker selected specific contacts from the victim’s friends list and sent additional malicious files. At the time, the attacker used a file name disguised as material promoting North Korea-related content to induce the recipient to open the file.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePasswords are disappearing and biometrics will replace them

Related Posts

CISA reports that Wing FTP vulnerability that leaks server paths is being actively exploited

March 17, 2026

GlassWorm attack uses stolen GitHub tokens to force-push malware to Python repositories

March 16, 2026

Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More

March 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Konni introduced EndRAT through spear phishing and used KakaoTalk to spread malware

Passwords are disappearing and biometrics will replace them

Putting the North East of England on the UK space map

UK unveils £45m Sunrise AI supercomputer to accelerate nuclear fusion

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.