By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
Computing

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

News Room
Last updated: 2026/01/26 at 4:12 AM
News Room Published 26 January 2026
Share
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
SHARE

Ravie LakshmananJan 26, 2026Malware / Endpoint Security

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector.

The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary’s expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check Point Research said in a technical report published last week.

Active since at least 2014, Konni is primarily known for its targeting of organizations and individuals in South Korea. It’s also tracked as Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia.

In November 2025, the Genians Security Center (GSC) detailed the hacking group’s targeting of Android devices by exploiting Google’s asset tracking service, Find Hub, to remotely reset victim devices and erase personal data from them, signaling a new escalation of their tradecraft.

As recently as this month, Konni has been observed distributing spear-phishing emails containing malicious links that are disguised as harmless advertising URLs associated with Google and Naver’s advertising platforms to bypass security filters and deliver a remote access trojan codenamed EndRAT.

The campaign has been codenamed Operation Poseidon by the GSC, with the attacks impersonating North Korean human rights organizations and financial institutions in South Korea. The attacks are also characterized by the use of improperly secured WordPress websites to distribute malware and for command-and-control (C2) infrastructure.

Cybersecurity

The email messages have been found to masquerade as financial notices, such as transaction confirmations or wire transfer requests, to trick recipients into downloading ZIP archives hosted on WordPress sites. The ZIP file comes with a Windows shortcut (LNK) that’s designed to execute an AutoIt script disguised as a PDF document. The AutoIt script is a known Konni malware called EndRAT (aka EndClient RAT).

“This attack is analyzed as a case that effectively bypassed email security filtering and user vigilance through a spear-phishing attack vector that exploited the ad click redirection mechanism used within the Google advertising ecosystem,” the South Korean security outfit said.

“It was confirmed that the attacker utilized the redirection URL structure of a domain used for legitimate ad click tracking (ad.doubleclick[.]net) to incrementally direct users to external infrastructure where actual malicious files were hosted.”

The latest campaign documented by Check Point leverages ZIP files mimicking project requirements-themed documents and hosted on Discord’s content delivery network (CDN) to unleash a multi-stage attack chain that performs the following sequence of actions. The exact initial access vector used in the attacks is unknown.

  • The ZIP archive contains a PDF decoy and an LNK file
  • The shortcut file launches an embedded PowerShell loader which extracts two additional files, a Microsoft Word lure document and a CAB archive, and displays as the Word document as a distraction mechanism
  • The shortcut file extracts the contents of the CAB archive, which contains a PowerShell Backdoor, two batch scripts, and an executable used for User Account Control (UAC) bypass
  • The first batch script is used to prepare the environment, establish persistence using a scheduled task, stage the backdoor and execute it, following which it deletes itself from disk to reduce forensic visibility
  • The PowerShell backdoor carries out a string of anti-analysis and sandbox-evasion checks, and then proceeds to profile the system and attempts to elevate privileges using the FodHelper UAC bypass technique
  • The backdoor performs cleanup of the previously dropped UAC bypass executable, configures Microsoft Defender exclusion for “C:ProgramData,” and runs the second batch script to replace the previously created scheduled task with a new one that’s capable of running with elevated privileges
  • The backdoor proceeds to drop SimpleHelp, a legitimate Remote Monitoring and Management (RMM) tool for persistent remote access, and communicates with a C2 server that’s safeguarded by an encryption gate intended to block non-browser traffic to periodically send host metadata and execute PowerShell code returned by the server

The cybersecurity company said there are indications that the PowerShell backdoor was created with the assistance of an AI tool, citing its modular structure, human-readable documentation, and the presence of source code comments like “# <– your permanent project UUID.”

“Instead of focusing on individual end-users, the campaign goal seems to be to establish a foothold in development environments, where compromise can provide broader downstream access across multiple projects and services,” Check Point said. “The introduction of AI-assisted tooling suggests an effort to accelerate development and standardize code while continuing to rely on proven delivery methods and social engineering.”

Cybersecurity

The findings coincide with the discovery of multiple North Korea-led campaigns that facilitate remote control and data theft –

  • A spear-phishing campaign that uses JavaScript Encoded (JSE) scripts mimicking Hangul Word Processor (HWPX) documents and government-themed decoy files to deploy a Visual Studio Code (VS Code) tunnel to establish remote access
  • A phishing campaign that distributes LNK files masquerading as PDF documents to launch a PowerShell script that detects virtual and malware analysis environments and delivers a remote access trojan called MoonPeak
  • A set of two cyber attacks, assessed to be conducted by Andariel in 2025, that targeted an unnamed European entity belonging to the legal sector to deliver TigerRAT, as well as compromised a South Korean Enterprise Resource Planning (ERP) software vendor’s update mechanism to distribute three new trojans to downstream victims, including StarshellRAT, JelusRAT, and GopherRAT

According to Finnish cybersecurity company WithSecure, the ERP vendor’s software has been the target of similar supply chain compromises twice in the past – in 2017 and again in 2024 – to deploy malware families like HotCroissant and Xctdoor.

While JelusRAT is written in C++ and supports capabilities to retrieve plugins from the C2 server, StarshellRAT is developed in C# and supports command execution, file upload/download, and screenshot capture. GopherRAT, on the other hand, is based on Golang and features the ability to run commands or binaries, exfiltrate files, and enumerate the file system.

“Their targeting and objectives have varied over time; some campaigns have pursued financial gain, while others have focused on stealing information aligned with the regime’s priority intelligence needs,” WithSecure researcher Mohammad Kazem Hassan Nejad said. “This variability underscores the group’s flexibility and its ability to support broader strategic goals as those priorities change over time.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article iQIYI launches content e-commerce amid revenue pressure, eyes livestream shopping · TechNode iQIYI launches content e-commerce amid revenue pressure, eyes livestream shopping · TechNode
Next Article Sovereign cloud and AI services tipped for take-off in 2026 | Computer Weekly Sovereign cloud and AI services tipped for take-off in 2026 | Computer Weekly
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

We Did the Math: How Much an Energy-Efficient Fridge Saves vs. a 10-year-old Model
We Did the Math: How Much an Energy-Efficient Fridge Saves vs. a 10-year-old Model
News
MongoDB vs ScyllaDB: Architecture Comparison | HackerNoon
MongoDB vs ScyllaDB: Architecture Comparison | HackerNoon
Computing
Synthesia bn valuation confirmed after Google-led Series E – UKTN
Synthesia $4bn valuation confirmed after Google-led Series E – UKTN
News
Synthesia hits B valuation, lets employees cash out |  News
Synthesia hits $4B valuation, lets employees cash out | News
News

You Might also Like

MongoDB vs ScyllaDB: Architecture Comparison | HackerNoon
Computing

MongoDB vs ScyllaDB: Architecture Comparison | HackerNoon

19 Min Read
Winning Against AI-Based Attacks Requires a Combined Defensive Approach
Computing

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

8 Min Read
AMDGPU Patches Updated For HDMI Gaming Features On Linux With Radeon Graphics
Computing

AMDGPU Patches Updated For HDMI Gaming Features On Linux With Radeon Graphics

3 Min Read
Tech influencers leak MTT S90, claim Moore Threads’ gaming GPU matches RTX 4060 · TechNode
Computing

Tech influencers leak MTT S90, claim Moore Threads’ gaming GPU matches RTX 4060 · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?