- KONNI hackers use KakaoTalk to ship malware and harvest account credentials from victims
- Attackers exploit Google Discover Hub to remotely wipe Android gadgets and evade detection
- Compromised PCs unfold malware to contacts whereas cellular gadgets are repeatedly manufacturing unit reset
North Korean menace actors with ties to the federal government had been seen resetting goal Android gadgets to manufacturing unit settings to cowl their tracks.
Researchers from Genians mentioned they noticed these assaults within the wild, concentrating on primarily people in South Korea, carried out by a gaggle referred to as KONNI (named after a distant entry instrument it’s utilizing)
The researchers say KONNI has “overlapping targets and infrastructure” with both Kimsuky, and APT37, known North Korean state-sponsored actors.
Wiping the device
The attack starts on KakaoTalk messenger, one of the most popular instant chat messaging platforms in the country, where KONNI’s agents impersonate trusted entities like the National Tax Service, or the police.
During the conversation, they send a digitally signed MSI file (or a ZIP archive with it) which, if the sufferer runs it, launches a script that finally downloads totally different malware modules, together with RemcosRAT, QuasarRAT, and RftRAT.
These RATs harvest all kinds of knowledge from the compromised gadget, together with Google and Naver account credentials that are then used to log into the sufferer’s Google account.
From there, they entry Google Discover Hub, a built-in instrument that lets customers remotely find, lock, or wipe their gadgets, and use it not solely to view all different registered Android gadgets, but in addition to trace the sufferer’s location.
Once they see the sufferer out and about, and unable to shortly tackle an assault, they ship distant issue reset instructions to all gadgets, erasing information, disabling alerts, and disconnecting the sufferer from the KakaoTalk PC classes. The wipe is completed thrice.
With the cellular gadget wiped however the KakaoTalk PC session nonetheless lively, the hackers use the compromised laptop to ship malicious recordsdata to the sufferer’s contacts, spreading the infections additional.
The motive behind the assault is unknown on the time, however state-sponsored menace actors are normally engaged in cyber-espionage and disruption.
Through BleepingComputer

The very best antivirus for all budgets
Follow TechRadar on Google News and add us as a preferred source to get our knowledgeable information, evaluations, and opinion in your feeds. Be certain that to click on the Comply with button!
And naturally you may as well follow TechRadar on TikTok for information, evaluations, unboxings in video kind, and get common updates from us on WhatsApp too.