Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

Posted on January 26, 2026January 26, 2026 By CWS

Ravie LakshmananJan 26, 2026Malware / Endpoint Safety
The North Korean menace actor generally known as Konni has been noticed utilizing PowerShell malware generated utilizing synthetic intelligence (AI) instruments to focus on builders and engineering groups within the blockchain sector.
The phishing marketing campaign has focused Japan, Australia, and India, highlighting the adversary’s enlargement of the focusing on scope past South Korea, Russia, Ukraine, and European nations, Test Level Analysis stated in a technical report revealed final week.
Lively since at the very least 2014, Konni is primarily identified for its focusing on of organizations and people in South Korea. It is also tracked as Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia.
In November 2025, the Genians Safety Middle (GSC) detailed the hacking group’s focusing on of Android units by exploiting Google’s asset monitoring service, Discover Hub, to remotely reset sufferer units and erase private information from them, signaling a brand new escalation of their tradecraft.
As just lately as this month, Konni has been noticed distributing spear-phishing emails containing malicious hyperlinks which are disguised as innocent promoting URLs related to Google and Naver’s promoting platforms to bypass safety filters and ship a distant entry trojan codenamed EndRAT.
The marketing campaign has been codenamed Operation Poseidon by the GSC, with the assaults impersonating North Korean human rights organizations and monetary establishments in South Korea. The assaults are additionally characterised by way of improperly secured WordPress web sites to distribute malware and for command-and-control (C2) infrastructure.

The e-mail messages have been discovered to masquerade as monetary notices, akin to transaction confirmations or wire switch requests, to trick recipients into downloading ZIP archives hosted on WordPress websites. The ZIP file comes with a Home windows shortcut (LNK) that is designed to execute an AutoIt script disguised as a PDF doc. The AutoIt script is a identified Konni malware known as EndRAT (aka EndClient RAT).
“This assault is analyzed as a case that successfully bypassed e mail safety filtering and person vigilance by means of a spear-phishing assault vector that exploited the advert click on redirection mechanism used throughout the Google promoting ecosystem,” the South Korean safety outfit stated.

“It was confirmed that the attacker utilized the redirection URL construction of a site used for reliable advert click on monitoring (advert.doubleclick[.]internet) to incrementally direct customers to exterior infrastructure the place precise malicious information have been hosted.”

The most recent marketing campaign documented by Test Level leverages ZIP information mimicking challenge requirements-themed paperwork and hosted on Discord’s content material supply community (CDN) to unleash a multi-stage assault chain that performs the next sequence of actions. The precise preliminary entry vector used within the assaults is unknown.

The ZIP archive incorporates a PDF decoy and an LNK file
The shortcut file launches an embedded PowerShell loader which extracts two extra information, a Microsoft Phrase lure doc and a CAB archive, and shows because the Phrase doc as a distraction mechanism
The shortcut file extracts the contents of the CAB archive, which incorporates a PowerShell Backdoor, two batch scripts, and an executable used for Person Account Management (UAC) bypass
The primary batch script is used to arrange the atmosphere, set up persistence utilizing a scheduled activity, stage the backdoor and execute it, following which it deletes itself from disk to scale back forensic visibility
The PowerShell backdoor carries out a string of anti-analysis and sandbox-evasion checks, after which proceeds to profile the system and makes an attempt to raise privileges utilizing the FodHelper UAC bypass approach
The backdoor performs cleanup of the beforehand dropped UAC bypass executable, configures Microsoft Defender exclusion for “C:ProgramData,” and runs the second batch script to switch the beforehand created scheduled activity with a brand new one which’s able to operating with elevated privileges
The backdoor proceeds to drop SimpleHelp, a reliable Distant Monitoring and Administration (RMM) software for persistent distant entry, and communicates with a C2 server that is safeguarded by an encryption gate meant to dam non-browser visitors to periodically ship host metadata and execute PowerShell code returned by the server

The cybersecurity firm stated there are indications that the PowerShell backdoor was created with the help of an AI software, citing its modular construction, human-readable documentation, and the presence of supply code feedback like “# <– your everlasting challenge UUID.”
“As a substitute of specializing in particular person end-users, the marketing campaign aim appears to be to ascertain a foothold in improvement environments, the place compromise can present broader downstream entry throughout a number of initiatives and providers,” Test Level stated. “The introduction of AI-assisted tooling suggests an effort to speed up improvement and standardize code whereas persevering with to depend on confirmed supply strategies and social engineering.”

The findings coincide with the invention of a number of North Korea-led campaigns that facilitate distant management and information theft –

A spear-phishing marketing campaign that makes use of JavaScript Encoded (JSE) scripts mimicking Hangul Phrase Processor (HWPX) paperwork and government-themed decoy information to deploy a Visible Studio Code (VS Code) tunnel to ascertain distant entry
A phishing marketing campaign that distributes LNK information masquerading as PDF paperwork to launch a PowerShell script that detects digital and malware evaluation environments and delivers a distant entry trojan known as MoonPeak
A set of two cyber assaults, assessed to be performed by Andariel in 2025, that focused an unnamed European entity belonging to the authorized sector to ship TigerRAT, in addition to compromised a South Korean Enterprise Useful resource Planning (ERP) software program vendor’s replace mechanism to distribute three new trojans to downstream victims, together with StarshellRAT, JelusRAT, and GopherRAT

In accordance with Finnish cybersecurity firm WithSecure, the ERP vendor’s software program has been the goal of comparable provide chain compromises twice prior to now – in 2017 and once more in 2024 – to deploy malware households like HotCroissant and Xctdoor.
Whereas JelusRAT is written in C++ and helps capabilities to retrieve plugins from the C2 server, StarshellRAT is developed in C# and helps command execution, file add/obtain, and screenshot seize. GopherRAT, alternatively, relies on Golang and options the power to run instructions or binaries, exfiltrate information, and enumerate the file system.
“Their focusing on and aims have different over time; some campaigns have pursued monetary acquire, whereas others have centered on stealing data aligned with the regime’s precedence intelligence wants,” WithSecure researcher Mohammad Kazem Hassan Nejad stated. “This variability underscores the group’s flexibility and its skill to assist broader strategic objectives as these priorities change over time.”

The Hacker News Tags:AIGenerated, Backdoor, Blockchain, Deploy, Developers, Hackers, Konni, PowerShell

Post navigation

Previous Post: 48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database
Next Post: Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid

Related Posts

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers The Hacker News
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances The Hacker News
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer The Hacker News
New Browser Security Report Reveals Emerging Threats for Enterprises The Hacker News
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto The Hacker News
Can Your Security Stack See ChatGPT? Why Network Visibility Matters The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Crunchbase Confirms Data Breach After Hacking Claims
  • New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same
  • Cyber Insights 2026: Threat Hunting in an Age of Automation and AI
  • Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More
  • Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Crunchbase Confirms Data Breach After Hacking Claims
  • New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same
  • Cyber Insights 2026: Threat Hunting in an Age of Automation and AI
  • Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More
  • Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark