Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Konni Uses Phishing to Spread EndRAT via KakaoTalk

Konni Uses Phishing to Spread EndRAT via KakaoTalk

Posted on March 17, 2026 By CWS

North Korean cybercriminals have been leveraging phishing techniques to gain unauthorized access to victims’ KakaoTalk desktop applications, subsequently distributing malware to select contacts. This campaign has been identified by Genians, a South Korean threat intelligence firm, as the work of the Konni hacker group.

Phishing as the Initial Attack Vector

The attack begins with a spear-phishing email that masquerades as a notification about a North Korean human rights lecture. Upon opening, the email prompts the recipient to execute a malicious LNK file, which instigates the installation of remote access malware. This malware remains hidden within the victim’s system, enabling the theft of sensitive documents and data over an extended period.

Konni’s approach is characterized by its ability to exploit the trust inherent in compromised systems, using victims’ KakaoTalk applications to further disseminate the malware. This tactic was previously observed in November 2025, when the group used KakaoTalk sessions to distribute malicious payloads while simultaneously wiping victims’ Android devices via stolen credentials.

Advanced Malware Deployment

The spear-phishing email contains a ZIP file attachment that includes a Windows shortcut (LNK). When executed, this file downloads additional payloads from an external server, establishing persistence through scheduled tasks. It then executes the malware while displaying a decoy PDF to distract the user.

The downloaded malware, known as EndRAT or EndClient RAT, is written in AutoIt and provides the attacker with full control over the compromised system. It facilitates activities such as file management, remote shell access, and data exfiltration. Further investigation revealed the presence of other malicious artifacts, like AutoIt scripts for RftRAT and RemcosRAT, suggesting a high-value target status.

Propagation Through KakaoTalk

A notable aspect of the attack is the utilization of the victim’s KakaoTalk application to send malicious files disguised as North Korea-related materials to the victim’s contacts. This strategy effectively turns victims into conduits for further malware dissemination.

According to Genians, this operation represents a sophisticated, multi-stage attack that combines spear-phishing with long-term persistence, data theft, and account exploitation. The selection of specific contacts from the victim’s friend list for further targeting highlights the calculated nature of the attack.

As cyber threats continue to evolve, awareness and vigilance remain crucial in mitigating the risks posed by such sophisticated campaigns.

The Hacker News Tags:Cybersecurity, endpoint security, EndRAT, KakaoTalk, Konni, Malware, Phishing, remote access trojan, spear-phishing, threat intelligence

Post navigation

Previous Post: Phishing Campaign Targets Microsoft Teams via Compromised Sites
Next Post: Surge in Cyberattacks: AI, APIs, and DDoS Converge

Related Posts

AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft The Hacker News
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain The Hacker News
Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps The Hacker News
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics The Hacker News
New Android Malware Threatens Pix Payments and Banking Apps New Android Malware Threatens Pix Payments and Banking Apps The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices
  • Intuitive Reports Cyberattack Affecting Data Security
  • PylangGhost RAT Targets Developers via npm Packages
  • RondoDox Botnet Expands to 174 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices
  • Intuitive Reports Cyberattack Affecting Data Security
  • PylangGhost RAT Targets Developers via npm Packages
  • RondoDox Botnet Expands to 174 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News