Konni’s Comedy of Errors: North Korean Hackers Phish for Intel in Ukraine’s Inbox!
Konni APT is ditching the usual Russian target for a Ukrainian phishing escapade. Their goal? To snoop on Russia’s invasion plans, all while impersonating non-existent think tanks. These cyber tricksters favor phishing emails loaded with malware, proving that even North Korean hackers can’t resist a good espionage plot twist.

Hot Take:
It seems like North Korea’s cyber ninjas aren’t just binge-watching Korean dramas but are also targeting Ukrainian government entities with their notorious phishing campaigns. Apparently, they’ve decided to do some field research on the Russian invasion trajectory. Who knew cyber espionage could be so geographically diverse?
Key Points:
- Konni APT, linked to North Korea, targets Ukrainian government entities.
- The campaign aims to gather intelligence on Russia’s invasion trajectory.
- Phishing emails distribute Konni RAT malware and credential harvesting pages.
- Konni has a history of targeting South Korea, the US, and Russia.
- Similar cyber campaigns linked to Kimsuky and APT37 targeting South Korea.
Already a member? Log in here