Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Konni Uses Phishing to Spread EndRAT via KakaoTalk

Konni Uses Phishing to Spread EndRAT via KakaoTalk

Posted on March 17, 2026 By CWS

North Korean cybercriminals have been leveraging phishing techniques to gain unauthorized access to victims’ KakaoTalk desktop applications, subsequently distributing malware to select contacts. This campaign has been identified by Genians, a South Korean threat intelligence firm, as the work of the Konni hacker group.

Phishing as the Initial Attack Vector

The attack begins with a spear-phishing email that masquerades as a notification about a North Korean human rights lecture. Upon opening, the email prompts the recipient to execute a malicious LNK file, which instigates the installation of remote access malware. This malware remains hidden within the victim’s system, enabling the theft of sensitive documents and data over an extended period.

Konni’s approach is characterized by its ability to exploit the trust inherent in compromised systems, using victims’ KakaoTalk applications to further disseminate the malware. This tactic was previously observed in November 2025, when the group used KakaoTalk sessions to distribute malicious payloads while simultaneously wiping victims’ Android devices via stolen credentials.

Advanced Malware Deployment

The spear-phishing email contains a ZIP file attachment that includes a Windows shortcut (LNK). When executed, this file downloads additional payloads from an external server, establishing persistence through scheduled tasks. It then executes the malware while displaying a decoy PDF to distract the user.

The downloaded malware, known as EndRAT or EndClient RAT, is written in AutoIt and provides the attacker with full control over the compromised system. It facilitates activities such as file management, remote shell access, and data exfiltration. Further investigation revealed the presence of other malicious artifacts, like AutoIt scripts for RftRAT and RemcosRAT, suggesting a high-value target status.

Propagation Through KakaoTalk

A notable aspect of the attack is the utilization of the victim’s KakaoTalk application to send malicious files disguised as North Korea-related materials to the victim’s contacts. This strategy effectively turns victims into conduits for further malware dissemination.

According to Genians, this operation represents a sophisticated, multi-stage attack that combines spear-phishing with long-term persistence, data theft, and account exploitation. The selection of specific contacts from the victim’s friend list for further targeting highlights the calculated nature of the attack.

As cyber threats continue to evolve, awareness and vigilance remain crucial in mitigating the risks posed by such sophisticated campaigns.

The Hacker News Tags:Cybersecurity, endpoint security, EndRAT, KakaoTalk, Konni, Malware, Phishing, remote access trojan, spear-phishing, threat intelligence

Post navigation

Previous Post: Phishing Campaign Targets Microsoft Teams via Compromised Sites
Next Post: Surge in Cyberattacks: AI, APIs, and DDoS Converge

Related Posts

Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts The Hacker News
North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The Hacker News
CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark