Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Today’s NYT Connections Hints, Answers for Jan. 25 #959

    January 25, 2026

    How Data-Driven Third-Party Logistics (3PL) Providers Are Transforming Modern Supply Chains

    January 25, 2026

    ios – Why does my page scroll up when I tap on a button?

    January 25, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Konni hackers target blockchain engineers with AI-built malware
    IT/ Cybersecurity

    Konni hackers target blockchain engineers with AI-built malware

    big tee tech hubBy big tee tech hubJanuary 24, 2026003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Konni hackers target blockchain engineers with AI-built malware
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Konni hackers target blockchain engineers with AI-built malware

    The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.

    Believed to be associated with APT37 and Kimsuky activity clusters, Konni has been active since at least 2014 and has been seen targeting organizations in South Korea, Russia, Ukraine, and various countries in Europe.

    Based on samples analyzed by Check Point researchers, the threat actor’s latest campaign focuses on targets in the Asia-Pacific region, as the malware was submitted from Japan, Australia, and India.

    Wiz

    The attack begins with the victim receiving a Discord-hosted link that delivers a ZIP archive containing a PDF lure and a malicious LNK shortcut file.

    The LNK runs an embedded PowerShell loader that extracts a DOCX document and a CAB archive containing a PowerShell backdoor, two batch files, and a UAC bypass executable.

    Launching the shortcut file causes the DOCX to open and to execute one batch file included in the cabinet file.

    Lure used in the phishing attack
    The lure used in the phishing attack
    Source: Check Point

    The lure DOCX document suggests that the hackers want to compromise development environments, which could provide them “access to sensitive assets, including infrastructure, API credentials, wallet access, and ultimately cryptocurrency holdings.”

    The first batch file creates a staging directory for the backdoor and the second batch file, and creates an hourly scheduled task masquerading as a OneDrive startup task.

    This task reads an XOR-encrypted PowerShell script from disk and decrypts it for in-memory execution. Finally, it deletes itself to wipe the signs of infection.

    Latest infection chain
    Latest infection chain
    Source: Check Point

    AI-generated backdoor

    The PowerShell backdoor itself is heavily obfuscated using arithmetic-based string encoding, runtime string reconstruction, and execution of the final logic via ‘Invoke-Expression.’

    The researchers say that the PowerShell malware “strongly indicates AI-assisted development rather than traditional operator-authored malware.”

    The evidence leading to this conclusion includes the clear, structured documentation at the top of the script, which is unusual for malware development; its modular, clean layout; and the presence of a “# <– your permanent project UUID” comment.

    The exposing string
    The exposing string
    Source: Check Point

    “This phrasing is highly characteristic of LLM-generated code, where the model explicitly instructs a human user on how to customize a placeholder value,” explains Check Point.

    “Such comments are commonly observed in AI-produced scripts and tutorials.”

    Before execution, the malware performs hardware, software, and user activity checks to ensure it is not running in analysis environments, and then generates a unique host ID.

    Next, depending on what execution privileges it has on the compromised host, it follows a separate path of action as shown in the following diagram.

    Privilege-based action diagram
    Privilege-based action diagram
    Source: Check Point

    Once the backdoor is fully running on the infected device, it periodically contacts the command-and-control (C2) server to send basic host metadata and polls the server at randomized intervals.

    If the C2 response contains PowerShell code, it turns it into a script block and executes it asynchronously via background jobs.

    Check Point attributes these attacks to the Konni threat actor based on earlier launcher formats, lure filename and script name overlaps, and commonalities in the execution chain structure with earlier attacks.

    The researchers have published indicators of compromise (IoCs) associated with this recent campaign to help defenders protect their assets.


    Wiz

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.



    Source link

    AIbuilt blockchain Engineers hackers Konni Malware target
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

    January 24, 2026

    Kimwolf Botnet Lurking in Corporate, Govt. Networks – Krebs on Security

    January 23, 2026

    2025’s most common passwords were as predictable as ever

    January 22, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Today’s NYT Connections Hints, Answers for Jan. 25 #959

    January 25, 2026

    How Data-Driven Third-Party Logistics (3PL) Providers Are Transforming Modern Supply Chains

    January 25, 2026

    ios – Why does my page scroll up when I tap on a button?

    January 25, 2026

    Konni hackers target blockchain engineers with AI-built malware

    January 24, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Today’s NYT Connections Hints, Answers for Jan. 25 #959

    January 25, 2026

    How Data-Driven Third-Party Logistics (3PL) Providers Are Transforming Modern Supply Chains

    January 25, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.