Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A New Layer of Sophistication: North Korea-Linked APT Konni Exploits Google Find Hub to Steal Data and Wipe Android Phones



In a recent cyber warfare operation, North Korea-linked APT group Konni has been utilizing Google's "Find Hub" service to remotely reset Android devices in South Korea, erasing users' personal data. This attack highlights the evolving sophistication of North Korean threat actors and their willingness to adapt and exploit new vulnerabilities. Stay informed about emerging threats and tactics with our expert analysis and guidance on how to prevent similar incidents.

  • The North Korea-linked APT group Konni has been using a previously unknown tactic: exploiting Google's "Find Hub" service to remotely reset Android devices in South Korea.
  • The attack chain began with spear-phishing emails impersonating the National Tax Service, highlighting the evolving sophistication of North Korean threat actors.
  • The Konni RAT has been undetected since 2014 and is capable of executing arbitrary code on target systems, stealing sensitive data.
  • Malicious files were delivered through KakaoTalk messenger, posing as psychological counselors and North Korean human rights activists to conduct trust-based attacks.
  • The attackers compromised devices and used them as relays to spread malware, wiping data and silencing alerts when victims were away from their devices.
  • Organizations should prioritize implementing robust security measures to prevent similar threats, including multi-factor authentication, encryption, and regular software updates.


  • In a recent cyber warfare operation, researchers from Genians Security Center (GSC) have uncovered evidence that the North Korea-linked APT group known as Konni has been utilizing a previously unknown tactic: exploiting Google's "Find Hub" service to remotely reset Android devices in South Korea, erasing users' personal data. This attack chain, which began with spear-phishing emails impersonating the National Tax Service, highlights the evolving sophistication of North Korean threat actors and their willingness to adapt and exploit new vulnerabilities.

    The Konni RAT, first spotted by Cisco Talos researchers in 2017, has been undetected since 2014 and was employed in highly targeted attacks. This sophisticated malware is capable of executing arbitrary code on target systems and stealing sensitive data. Its ability to avoid detection due to continuous evolution makes it a formidable tool for threat actors.

    According to the report published by GSC, malicious files were delivered through the KakaoTalk messenger, leveraging impersonation of acquaintances to conduct trust-based attacks. Attackers posed as psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs. This tactic not only allows them to gain the victim's trust but also serves as a distraction from their malicious intentions.

    The attack chain's next phase involved compromising devices and using them as relays to spread malware through victims' KakaoTalk accounts. When victims were confirmed away from their devices via Google's Find Hub, attackers issued remote reset commands to Android phones and tablets, wiping data and silencing alerts. This tactic not only erases the victim's personal data but also prevents them from receiving notifications or responding to messages.

    The attackers then exploited KakaoTalk's active PC sessions to distribute malware, blending evasion and propagation techniques. This allowed them to maintain persistence on compromised endpoints for extended periods, harvesting user data and conducting covert surveillance via webcams.

    The report highlights the emergence of this tactic and provides guidance in detecting and mitigating similar threats. It also serves as a reminder that threat actors are continually adapting and evolving their tactics, making it essential for organizations and individuals to stay vigilant and proactive in defending against cyber threats.

    In light of this new development, it is crucial to understand the implications of this attack and how to prevent similar incidents. Organizations should prioritize implementing robust security measures, including multi-factor authentication, encryption, and regular software updates, to protect against spear-phishing attacks and malicious RATs. Individuals must also be cautious when interacting with unknown senders and attachments, avoiding any suspicious emails or messages that may contain malware.

    Furthermore, this attack highlights the importance of continuous awareness and education in cybersecurity. As threat actors become more sophisticated, it is essential for individuals to stay informed about emerging threats and tactics, and for organizations to invest in ongoing security training and awareness programs.

    In conclusion, the North Korea-linked APT Konni's exploitation of Google Find Hub to steal data and wipe Android phones serves as a stark reminder of the evolving sophistication of cyber threats. As we move forward in this complex cybersecurity landscape, it is crucial to remain vigilant, proactive, and informed about emerging threats and tactics.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-New-Layer-of-Sophistication-North-Korea-Linked-APT-Konni-Exploits-Google-Find-Hub-to-Steal-Data-and-Wipe-Android-Phones-ehn.shtml

  • https://securityaffairs.com/184474/intelligence/north-korea-konni-apt-used-google-find-hub-to-erase-data-and-spy-on-defectors.html


  • Published: Tue Nov 11 06:50:30 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us