Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
HackTheBox 970x120 1
KONNI Malware Targets Crypto Developers with AI-Powered Attacks

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

22 January 2026 17:10

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded its reach to the APAC region, targeting Japan, Australia, and India.

The peculiarity of this offensive lies in its target: no longer just officials, but teams of engineers and software developers with access to blockchain infrastructure and crypto resources.

The attack is notable for its use of extremely carefully crafted technical decoys, which mimic legitimate project documents complete with architectures, timelines, and budgets.

The primary objective seems clear: to infiltrate development environments to steal API credentials, digital wallet keys, and crypto assets. This evolution suggests a shift toward purely financial objectives, exploiting the complexity of decentralized systems to maximize illicit profits.

Chain of infection (Source Checkpoint Research)

The Rise of AI-Generated Malware

The most surprising element of the analysis is the discovery of a PowerShell backdoor that shows unmistakable signs of AI assistance . The code doesn’t appear to be a typical script written by a human operator under pressure, but follows an exceedingly clean and commented modular structure.

The presence of placeholders with explicit instructions suggests that the KONNI group is using language patterns to accelerate the creation of increasingly complex malicious tools.

Mechanisms of infection and persistence

The attack chain, researchers report, begins with a link hosted on Discord that downloads a ZIP archive containing a decoy file and a malicious Windows shortcut.

Once activated, the system runs a series of anti-analysis checks to detect the presence of sandboxes or monitoring tools like Wireshark. To ensure persistence, the malware creates a scheduled task that mimics a OneDrive update process, running every hour to maintain control.

Privileges and remote control

The backdoor is designed to adapt to the privileges of the affected user. If rights are limited, it attempts to bypass Windows UAC to gain administrative privileges and disable security notifications. In advanced scenarios, attackers deploy SimpleHelp, a legitimate remote management tool, to maintain long-term interactive access.

This allows criminals to move laterally across the network, turning a single infection into a complete compromise of the development infrastructure.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.