CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Konni APT leverages EndRAT and KakaoTalk for multi-stage phishing and lateral propagation

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A North Korean advanced persistent threat (APT) group, tracked as Konni, conducted a multi-stage spear-phishing campaign to compromise targets and abuse compromised KakaoTalk desktop application sessions for malware propagation. Initial access was achieved via a spear-phishing email masquerading as an appointment notice for a North Korean human rights lecturer, leading to execution of a malicious LNK file. The payload deployed a remote access trojan (RAT) named EndRAT (written in AutoIt), establishing persistence via scheduled tasks and exfiltrating sensitive data. The adversary maintained long-term access on compromised hosts, stole internal documents, and used the victim’s KakaoTalk contacts to selectively propagate malware via ZIP archives disguised as North Korea-related content. The campaign reflects a high-trust abuse strategy, leveraging compromised user accounts to deceive additional targets.

Timeline

  1. 17.03.2026 11:53 1 articles · 3h ago

    Konni APT abuses EndRAT and KakaoTalk for multi-stage phishing and lateral malware propagation

    Konni APT compromised targets via spear-phishing emails delivering a malicious LNK file that deployed EndRAT, a remote access trojan written in AutoIt. The adversary established persistence through scheduled tasks and stole sensitive data from compromised hosts. Leveraging compromised KakaoTalk sessions, the actor selectively propagated malware to contacts via ZIP files disguised as North Korea-related content, turning victims into intermediaries for further attacks.

    Show sources

Information Snippets