Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

Konni APT’s Covert RAT Deployment

Amber | Attack Report
Download PDF

Summary

The Konni APT group conducted a sophisticated multi-stage attack operation in February 2026 that demonstrates advanced social engineering tactics combined with patient, long-term intelligence collection objectives. The campaign began with highly targeted spear-phishing emails disguised as North Korean human rights lecturer appointment notices, exploiting the professional interests and ideological concerns of victims within human rights organizations worldwide. Upon initial compromise via malicious LNK shortcut files hidden within ZIP archives, the threat actor deployed EndRAT remote access trojan for persistent remote access, stole sensitive documents over an extended dwell period, and subsequently abused the victim’s KakaoTalk PC messenger session to selectively redistribute malicious payloads to contacts, effectively turning compromised victims into unwitting intermediaries for further attacks.

This Konni APT campaign targets human rights organizations globally on Windows platforms, specifically exploiting the KakaoTalk PC application popular in South Korea and among Korean diaspora communities. The threat actor deploys multiple remote access trojans including EndRAT (AutoIt-based), RftRAT, and RemcosRAT, each employing distinct obfuscation and persistence techniques to maintain long-term access for sustained intelligence collection operations. The operation demonstrates characteristics consistent with North Korean state-sponsored cyber espionage, including targeting of human rights organizations focused on North Korean issues, use of North Korea-themed social engineering lures, and patient intelligence collection over extended periods.

The attack chain combines technical sophistication with social manipulation, leveraging trust relationships within targeted communities to propagate malware through legitimate communication channels. By compromising initial victims and then using their authentic KakaoTalk messenger sessions to distribute malicious files to contacts under the guise of North Korea-related content, Konni effectively weaponizes trust networks within the human rights community, making detection and prevention significantly more challenging.

Attack Details

Targeted Spear-Phishing with Human Rights Themes

In a carefully orchestrated intrusion demonstrating deep understanding of target psychology, the Konni APT group resurfaced in February 2026 with a multi-stage campaign that strategically blends social engineering with stealthy malware delivery, transforming professional trust into its most effective weapon. The attack operation begins with highly targeted spear-phishing emails posing as official notices appointing recipients as North Korean human rights lecturers, a theme carefully selected to resonate with victims working in human rights organizations focused on North Korean issues.

By aligning the phishing lure directly with the victim’s professional interests, known affiliations, and ideological commitments, the attackers dramatically increase the likelihood of engagement, ultimately convincing targets to open ZIP archives containing seemingly legitimate appointment documentation. This social engineering approach demonstrates sophisticated targeting intelligence and understanding of the human rights community’s communication patterns and professional networks.

Multi-Stage Malware Deployment Chain

Once victims extract the malicious archive, they encounter a Windows shortcut LNK file cleverly disguised with a document icon designed to appear as a legitimate PDF or Word document. When the victim executes this LNK file, it silently triggers a PowerShell-based dropper via cmd.exe using the SysWOW64 path, likely a deliberate technical choice to bypass certain security defenses or ensure compatibility across different Windows system architectures.

The PowerShell script employs a sophisticated technique to identify its embedded payload based on file size characteristics rather than filename patterns, then decodes the embedded malicious data using an XOR decryption routine. Simultaneously, a legitimate decoy PDF document is extracted and automatically opened to maintain the illusion of legitimacy and prevent victim suspicion, while the original LNK file is immediately removed from the filesystem to reduce forensic traces and complicate incident response investigations.

Persistent Access Through Scheduled Tasks and Startup Mechanisms

The attack operation then escalates significantly as the malware shifts execution to a public directory accessible across user sessions and retrieves additional payload components from its command-and-control infrastructure. These secondary payloads include a legitimate AutoIt interpreter application and a malicious AutoIt script cleverly disguised as a PDF file, wrapped within multiple layers of benign-looking data structures specifically designed to evade detection by antivirus and endpoint protection platforms.

Persistence is firmly established through multiple redundant mechanisms, including a scheduled task configured to execute every minute for nearly a full year, ensuring continuous operational access even after system reboots, user logoffs, or attempted remediation efforts. Additional persistence is achieved through LNK files placed in the Windows Startup folder, guaranteeing malware execution whenever any user logs into the compromised system.

EndRAT Remote Access Trojan Capabilities

At the operational core of this campaign is EndRAT, a sophisticated AutoIt-based remote access trojan equipped with comprehensive capabilities including file system manipulation, remote shell access for executing arbitrary commands, controlled data exfiltration with bandwidth throttling to avoid detection, and system reconnaissance to identify high-value intelligence targets. The malware’s command-and-control communications deliberately avoid standard HTTP patterns that might trigger network security monitoring, instead relying on custom socket protocols over commonly allowed ports like TCP 80 and 443, allowing malicious traffic to blend seamlessly into normal web browsing activity.

Additional operational security safeguards include mutex-based execution control to prevent multiple instances from conflicting, built-in error handling to maintain stability during network disruptions, and modular command structures that allow operators to dynamically adjust capabilities based on intelligence requirements. These technical characteristics demonstrate a mature, well-resourced operation focused on long-term persistent access rather than quick smash-and-grab attacks.

Weaponization of Trusted Communication Channels

Over extended operational periods spanning weeks or months, the Konni attackers quietly expand their access within compromised environments, harvesting sensitive documents related to North Korean human rights issues, organizational strategies, donor information, and internal communications. Most significantly, the threat actors leverage the victim’s trusted applications, particularly the KakaoTalk PC messenger widely used in South Korean and Korean diaspora communities, to propagate further attacks through authentic trusted channels.

By sending malicious ZIP archives to carefully selected contacts from the victim’s authentic messenger account under the guise of North Korea-themed content such as research documents, human rights reports, or policy briefings, the campaign effectively transforms each compromised victim into an unwitting distributor of malware. This abuse of trust relationships within professional networks makes the malicious files appear legitimate, dramatically increasing infection success rates while complicating attribution and detection efforts. Recipients receiving malicious files from trusted colleagues through authentic messenger sessions are far more likely to open the attachments without suspicion, perpetuating the infection cycle across entire organizational networks and professional communities.

Further technical analysis reveals a broader operational toolkit including multiple remote access trojan variants such as EndRAT, RftRAT, and RemcosRAT, each employing distinct obfuscation techniques, persistence mechanisms, and command-and-control protocols. Together, these technical elements highlight a well-resourced, patient operation focused on long-term intelligence access and sustained collection against human rights organizations monitoring North Korean issues.

Recommendations

Block Known C2 Infrastructure

Immediately block all identified command-and-control domains and IP addresses at the firewall, proxy, and DNS levels to disrupt active command-and-control communications and prevent compromised systems from receiving additional instructions or exfiltrating stolen data. Organizations should integrate these indicators into threat intelligence platforms and ensure blocking is maintained across all network security layers.

Quarantine Malicious LNK and Archive Attachments

Configure email security gateways to inspect, quarantine, or block ZIP archives containing LNK shortcut files, particularly those using document-like icons designed to masquerade as legitimate file types. Prioritize enhanced inspection of emails using socially and politically sensitive themes such as North Korea, human rights advocacy, national security briefings, and official notices from public institutions, as these are frequently exploited by Konni and similar threat actors.

Hunt for AutoIt-Based Execution Chains

Conduct proactive threat hunting across all endpoints for indicators of AutoIt-based malware execution, including the presence of AutoIt3.exe in non-standard filesystem paths outside legitimate software installation directories, .au3 script files or disguised .pdf files being executed as AutoIt scripts, and scheduled tasks configured with unusually short repetition intervals such as every minute. These behavioral patterns are strong indicators of Konni malware deployment.

Audit Scheduled Tasks and Startup Entries

Review all endpoints for suspicious scheduled task registrations, particularly tasks named APDNHFU or similar random character combinations that execute AutoIt scripts from public directories, and inspect for unexpected LNK files in Windows Startup folders located at %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup. Remove any unauthorized persistence mechanisms and investigate associated systems for additional compromise indicators.

Implement Messenger Security Controls

Establish comprehensive security guidelines governing file transfers via KakaoTalk and similar desktop messaging platforms popular within targeted communities. Deploy behavioral monitoring to detect abnormal file-sharing patterns such as bulk file transfers to multiple recipients, repeated ZIP file transmissions within short timeframes, or file-sharing behaviors inconsistent with a user’s normal messaging activity patterns and professional role. Organizations should consider implementing file transfer restrictions or mandatory security scanning for all attachments received through instant messaging applications.

Indicators of Compromise (IOCs)

The threat advisory includes indicators of compromise associated with Konni APT operations, including MD5 hashes of malware samples including LNK files, PowerShell droppers, AutoIt scripts, and various RAT payloads, command-and-control domain infrastructure, and IPv4 addresses of attacker-controlled servers. Organizations should integrate these indicators into their security monitoring systems, endpoint detection platforms, threat intelligence feeds, and network security devices to identify potential Konni activity. Given the targeted nature of this campaign against human rights organizations, affected sectors should prioritize threat hunting using these indicators and conduct comprehensive security assessments of systems handling sensitive information related to North Korean human rights issues.

MITRE ATT&CK TTPs

The Konni APT campaign employs multiple tactics and techniques mapped to the MITRE ATT&CK framework, including initial access through phishing via spearphishing attachments, execution through command and scripting interpreters including PowerShell and AutoIt alongside user execution of malicious files, persistence through scheduled tasks and boot or logon autostart execution via registry run keys and startup folder LNK files, defense evasion through masquerading with document icons, obfuscated files and information using software packing, and indicator removal through file deletion, discovery of system information and file and directory structures, collection of data from local systems, command and control using application layer protocols over web protocols with custom socket implementations, and exfiltration over command-and-control channels.

References

The threat advisory references authoritative security research from Genians documenting Konni APT’s abuse of KakaoTalk messenger for malware distribution. This reference provides additional technical depth and analysis for security teams investigating Konni activity or implementing defensive measures against APT campaigns targeting human rights organizations through social engineering and trusted communication platforms.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox