Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Konni Uses Phishing to Spread EndRAT via KakaoTalk

Konni Uses Phishing to Spread EndRAT via KakaoTalk

Posted on March 17, 2026 By CWS

North Korean cybercriminals have been leveraging phishing techniques to gain unauthorized access to victims’ KakaoTalk desktop applications, subsequently distributing malware to select contacts. This campaign has been identified by Genians, a South Korean threat intelligence firm, as the work of the Konni hacker group.

Phishing as the Initial Attack Vector

The attack begins with a spear-phishing email that masquerades as a notification about a North Korean human rights lecture. Upon opening, the email prompts the recipient to execute a malicious LNK file, which instigates the installation of remote access malware. This malware remains hidden within the victim’s system, enabling the theft of sensitive documents and data over an extended period.

Konni’s approach is characterized by its ability to exploit the trust inherent in compromised systems, using victims’ KakaoTalk applications to further disseminate the malware. This tactic was previously observed in November 2025, when the group used KakaoTalk sessions to distribute malicious payloads while simultaneously wiping victims’ Android devices via stolen credentials.

Advanced Malware Deployment

The spear-phishing email contains a ZIP file attachment that includes a Windows shortcut (LNK). When executed, this file downloads additional payloads from an external server, establishing persistence through scheduled tasks. It then executes the malware while displaying a decoy PDF to distract the user.

The downloaded malware, known as EndRAT or EndClient RAT, is written in AutoIt and provides the attacker with full control over the compromised system. It facilitates activities such as file management, remote shell access, and data exfiltration. Further investigation revealed the presence of other malicious artifacts, like AutoIt scripts for RftRAT and RemcosRAT, suggesting a high-value target status.

Propagation Through KakaoTalk

A notable aspect of the attack is the utilization of the victim’s KakaoTalk application to send malicious files disguised as North Korea-related materials to the victim’s contacts. This strategy effectively turns victims into conduits for further malware dissemination.

According to Genians, this operation represents a sophisticated, multi-stage attack that combines spear-phishing with long-term persistence, data theft, and account exploitation. The selection of specific contacts from the victim’s friend list for further targeting highlights the calculated nature of the attack.

As cyber threats continue to evolve, awareness and vigilance remain crucial in mitigating the risks posed by such sophisticated campaigns.

The Hacker News Tags:Cybersecurity, endpoint security, EndRAT, KakaoTalk, Konni, Malware, Phishing, remote access trojan, spear-phishing, threat intelligence

Post navigation

Previous Post: Phishing Campaign Targets Microsoft Teams via Compromised Sites
Next Post: Surge in Cyberattacks: AI, APIs, and DDoS Converge

Related Posts

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs The Hacker News
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News
How Continuous Exposure Management Transforms Security Operations How Continuous Exposure Management Transforms Security Operations The Hacker News
Prioritization, Validation, and Outcomes That Matter Prioritization, Validation, and Outcomes That Matter The Hacker News
Ivanti EPMM Security Flaw Exploited by Single IP Source Ivanti EPMM Security Flaw Exploited by Single IP Source The Hacker News
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RondoDox Botnet Expands to 174 Vulnerabilities
  • Phishing Tactics Exploit Safe Links with Complex URL Rewrites
  • CISA Highlights Exploited Wing FTP Security Flaw
  • AI Security Lags Behind as Skills Fail to Evolve
  • New Ransomware ‘Payload’ Targets Windows and ESXi

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RondoDox Botnet Expands to 174 Vulnerabilities
  • Phishing Tactics Exploit Safe Links with Complex URL Rewrites
  • CISA Highlights Exploited Wing FTP Security Flaw
  • AI Security Lags Behind as Skills Fail to Evolve
  • New Ransomware ‘Payload’ Targets Windows and ESXi

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News