North Korea's KONNI APT Abuses Google Find Hub to Spy and Erase Data
- Nov 12, 2025
- 2 min read
Key Findings
North Korea-linked Konni APT group posed as psychological counselors and North Korean human rights activists to distribute malware disguised as stress-relief programs via KakaoTalk messenger
Attackers compromised victims' Google accounts and abused Google's "Find Hub" service to remotely reset Android devices in South Korea, erasing users' personal data
This is the first known case of a state-sponsored APT group exploiting Find Hub to perform destructive remote wipes and track victims' locations
Attackers leveraged compromised KakaoTalk accounts to propagate malware to victims' contacts, expanding the infection chain
Malware payloads included remote access trojans such as Lilith RAT, enabling data theft, surveillance, and long-term persistence on infected systems
Background
The Konni APT group (also known as Kimsuky, Earth Imp, TA406, Thallium, Vedalia, and Velvet Chollima) has been active since 2014 and has conducted highly targeted attacks, often against North Korean defectors and human rights activists
The group has been attributed to North Korea-linked threat actors and has employed the KONNI remote access trojan (RAT) in its operations
The KONNI RAT is a versatile malware that can execute arbitrary code and steal data from compromised systems
Social Engineering and Delivery
Attackers impersonated psychological counselors and North Korean human rights activists to build trust with targets
Malicious files were delivered through the KakaoTalk messenger, leveraging the impersonation of acquaintances to conduct trust-based attacks
The payload was a malicious Microsoft Installer (MSI) package disguised as a "Stress Clear" program
Exploitation and Remote Access
After compromising victims' devices, the attackers used them as relays to spread malware through victims' KakaoTalk accounts
Attackers leveraged the compromised Google accounts to track victims' locations and trigger remote wipes of their Android devices using the Find Hub service
The remote reset commands were repeatedly sent, disrupting and delaying the normal recovery and use of the targeted devices
Data Theft and Espionage
The malware payloads included remote access trojans such as Lilith RAT, Quasar RAT, and RftRAT, enabling data theft, system control, and long-term surveillance
Without behavior-based detection like EDR, the attackers were able to persist on infected systems, stealing data and spying on victims for extended periods
Indicators of Compromise (IoCs)
The report provides a comprehensive list of IoCs, including:
Malware hashes
C2 server addresses
Compromised WordPress sites used as staging infrastructure
Indicators related to the KONNI RAT and associated malware families
Sources
https://securityaffairs.com/184474/intelligence/north-korea-konni-apt-used-google-find-hub-to-erase-data-and-spy-on-defectors.html
https://securityonline.info/north-koreas-konni-apt-hijacks-google-find-hub-to-remotely-wipe-and-track-south-korean-android-devices/


Comments