By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
Computing

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware

News Room
Last updated: 2026/03/17 at 6:27 AM
News Room Published 17 March 2026
Share
Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
SHARE

Ravie LakshmananMar 17, 2026Threat Intelligence / Endpoint Security

North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim’s KakaoTalk desktop application to distribute malicious payloads to certain contacts.

The activity has been attributed by South Korean threat intelligence firm Genians to a hacking group referred to as Konni.

“Initial access was achieved through a spear-phishing email disguised as a notice appointing the recipient as a North Korean human rights lecturer,” the Genians Security Center (GSC) noted in an analysis.

“After the spear-phishing attack succeeded, the victim executed a malicious LNK file, resulting in infection with remote access malware. The malware remained concealed and persistent on the victim’s endpoint for an extended period, stealing internal documents and sensitive information.”

The threat actor is said to have remained on the compromised host for an extended period of time, leveraging the unauthorized access to siphon internal documents and the KakaoTalk application to selectively propagate the malware to specific contacts.

The attack is notable for abusing the trust associated with compromised victims to deceive and ensnare additional targets. This is not the first time Konni has employed the messaging app as a distribution vector. In November 2025, the hacking group was found abusing signed-in KakaoTalk chat app sessions to send malicious payloads to victims’ contacts in the form of a ZIP archive, while simultaneously initiating a remote wipe of their Android devices using stolen Google credentials.

The starting point of the latest attack campaign is a spear-phishing email that’s used as a ploy to trick recipients into opening a ZIP file attachment containing a Windows shortcut (LNK). Upon execution, the LNK file downloads a next-stage payload from an external server, establishes persistence using scheduled tasks, and ultimately executes the malware, while displaying a PDF decoy document to the user as a distraction mechanism.

Written in AutoIt, the downloaded malware is a remote access trojan (RAT) named EndRAT (aka EndClient RAT), which allows the operator to remotely commandeer the compromised host through capabilities like file management, remote shell access, data transfer, and persistence.

Further analysis of the infected host has uncovered the presence of various malicious artifacts, including AutoIt scripts corresponding to RftRAT and RemcosRAT, indicating that the adversary deemed the victim as valuable enough to drop multiple RAT families for improved resilience.

An important aspect of the attack is the threat actor’s abuse of the victim’s KakaoTalk application installed on the infected system to distribute malicious files in the form of ZIP files to other individuals in their contact list and deploy the same malware. This essentially turns existing victims into intermediaries for further attacks.

“This campaign is assessed as a multi-stage attack operation that extends beyond simple spear-phishing, combining long-term persistence, information theft, and account-based redistribution,” Genians said. “The actor selected certain contacts from the victim’s friend list and sent them additional malicious files. In doing so, the attacker used filenames disguised as materials introducing North Korea-related content to induce recipients to open the files.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article MacBook Neo vs older MacBook Air models: Specs, performance compared MacBook Neo vs older MacBook Air models: Specs, performance compared
Next Article Sonos finally returns to hardware with Jennifer Tuohy on Smart Home Insider Sonos finally returns to hardware with Jennifer Tuohy on Smart Home Insider
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The TechBeat: Google Antigravity: 20 Game-Changing Prompts for Complete Automation (3/17/2026) | HackerNoon
The TechBeat: Google Antigravity: 20 Game-Changing Prompts for Complete Automation (3/17/2026) | HackerNoon
Computing
QCon London 2026: Your Multi-Cloud Strategy Is a Product Problem — Treat It Like One
QCon London 2026: Your Multi-Cloud Strategy Is a Product Problem — Treat It Like One
News
The Oppo Find X9 Ultra could come with a serious zoom upgrade
The Oppo Find X9 Ultra could come with a serious zoom upgrade
Gadget
Intel Graphics Compiler 2.30.1 Exposes HF8 Support For Crescent Island
Intel Graphics Compiler 2.30.1 Exposes HF8 Support For Crescent Island
Computing

You Might also Like

The TechBeat: Google Antigravity: 20 Game-Changing Prompts for Complete Automation (3/17/2026) | HackerNoon
Computing

The TechBeat: Google Antigravity: 20 Game-Changing Prompts for Complete Automation (3/17/2026) | HackerNoon

7 Min Read
Intel Graphics Compiler 2.30.1 Exposes HF8 Support For Crescent Island
Computing

Intel Graphics Compiler 2.30.1 Exposes HF8 Support For Crescent Island

2 Min Read
Japan’s Nissan receives more than 20,000 non-refundable orders for China-specific N7 sedan · TechNode
Computing

Japan’s Nissan receives more than 20,000 non-refundable orders for China-specific N7 sedan · TechNode

1 Min Read
How Oyster’s AI turns a selfie into a skincare analysis
Computing

How Oyster’s AI turns a selfie into a skincare analysis

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?