Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (2,686)
  • Analysis (2,833)
  • Bitcoin (3,441)
  • Blockchain (2,092)
  • DeFi (2,530)
  • Ethereum (2,379)
  • Event (100)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,590)
  • Press Releases (10)
  • Reddit (2,113)
  • Regulation (2,408)
  • Security (3,304)
  • Thought Leadership (3)
  • Videos (43)
Hand picked
  • Ripple/Amazon partnership.
  • HSK is available for exchange!
  • LIQI Issues $100M RWA on XDC – Why Other L1s Should Take Note!
  • Santiment reports XRP and Ethereum as undervalued after withdrawal
  • This new crypto aims for 500% growth as the V1 protocol has just been launched
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Blockchain»Konni hackers target blockchain engineers with AI-created malware
Blockchain

Konni hackers target blockchain engineers with AI-created malware

January 28, 2026No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Konni hackers target blockchain engineers with AI-created malware

North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain industry.

Believed to be associated with the APT37 and Kimsuky clusters, Konni has been active since at least 2014 and has been seen targeting organizations in South Korea, Russia, Ukraine, and various countries in Europe.

Based on samples analyzed by Check Point researchers, the threat actor’s latest campaign focuses on targets in the Asia-Pacific region, with the malware having been submitted from Japan, Australia, and India.

Ace

The attack begins when the victim receives a link hosted on Discord that provides a ZIP archive containing a decoy PDF and a malicious LNK shortcut file.

The LNK runs an embedded PowerShell loader that extracts a DOCX document and a CAB archive containing a PowerShell backdoor, two batch files, and a UAC bypass executable.

Launching the shortcut file opens the DOCX and executes a batch file included in the CAB file.

Lure used in phishing attack
The lure used in the phishing attack
Source: Checkpoint

The DOCX decoy document suggests that hackers want to compromise development environments, which could provide them with “access to sensitive assets, including infrastructure, API credentials, wallet access, and ultimately cryptocurrency holdings.”

The first batch file creates a staging directory for the backdoor and the second batch file, and creates an hourly scheduled task masquerading as a OneDrive startup task.

This task reads an XOR-encrypted PowerShell script from disk and decrypts it for execution in memory. Finally, it removes itself to erase the signs of infection.

Latest infection chain
Latest infection chain
Source: Checkpoint

AI-generated backdoor

The PowerShell backdoor itself is heavily obfuscated using arithmetic-based string encoding, execution string reconstruction, and execution of final logic via “Invoke-Expression”.

The researchers say the PowerShell malware “strongly indicates AI-assisted development rather than traditional operator-created malware.”

Evidence leading to this conclusion includes the clear, structured documentation at the top of the script, which is unusual for malware development; its modular and refined layout; and the presence of a comment “# <– your permanent project UUID”.

The exhibition chain
The exhibition chain
Source: Checkpoint

“This wording is very characteristic of LLM-generated code, where the model explicitly tells a human user how to customize a placeholder value,” Check Point explains.

“Such comments are commonly seen in AI-produced scripts and tutorials.”

Before execution, the malware performs checks of hardware, software, and user activity to ensure that it is not running in scanning environments, then generates a unique host ID.

Then, based on the execution privileges it has on the compromised host, it follows a separate path of action, as shown in the following diagram.

Privilege-based action diagram
Privilege-based action diagram
Source: Checkpoint

Once the backdoor is fully operational on the infected device, it periodically contacts the command and control (C2) server to send basic host metadata and polls the server at random intervals.

If the C2 response contains PowerShell code, it turns it into a script block and executes it asynchronously through background tasks.

Check Point attributes these attacks to threat actor Konni based on previous launcher formats, overlapping file names and script names, and commonalities in execution chain structure with previous attacks.

Researchers have released Indicators of Compromise (IoCs) associated with this recent campaign to help defenders protect their assets.

Ace

Whether you want to clean up old keys or set guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of managing secrets.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDonald Trump Will not Consider Pardon for Sam Bankman-Fried: NYT
Next Article DeFi Technologies Announces Valor Receives UK Regulatory Approval and Begins Offering Certain Yield Crypto ETPs to UK Retail Investors Via London Stock Exchange Deutschland – English USA – English Deutschland – Deutsch

Related Posts

Blockchain

Financial MagnatesIC Markets Hires Blockchain Expert Jaser Mahmoud as Chief Technology OfficerIC Markets has appointed blockchain technology expert Jaser Mahmoud as Chief Technology Officer, adding experienced digital asset….14 hours ago

January 28, 2026
Blockchain

Miyi.io and Feixiaohao present “Blockchain Impact” on January 20 at Impact Arena in Bangkok

January 28, 2026
Blockchain

Ripple partners with Saudi banking unit on blockchain payments and custody — TradingView News

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

What impact is the recently approved crypto regulation having in Brazil? The answer will be at MERGE São Paulo this March

January 28, 2026

SÃO PAULO, JANUARY 28, 2026 – São Paulo city will host Latin America’s leading debate…

Event

Next Block Expo 2026: The Biggest Edition Yet

January 22, 2026

Get ready for the biggest edition yet of Europe’s premier Blockchain Festival! Next Block Expo…

1 2 3 … 72 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

LIQI Issues $100M RWA on XDC – Why Other L1s Should Take Note!

January 28, 2026

Wallet linked to US crypto theft launches Solana Meme Coin – plunges 97% overnight

January 28, 2026

Ripple Treasury aims to modernize global financial operations

January 28, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 89,498.00
ethereum
Ethereum (ETH) $ 2,998.94
tether
Tether (USDT) $ 0.998774
bnb
BNB (BNB) $ 898.33
xrp
XRP (XRP) $ 1.90
usd-coin
USDC (USDC) $ 0.999601
staked-ether
Lido Staked Ether (STETH) $ 3,002.60
jusd
JUSD (JUSD) $ 0.999053
tron
TRON (TRX) $ 0.290753
dogecoin
Dogecoin (DOGE) $ 0.124507