North Korean Hackers Hijack Google Find Hub: South Korea’s Worst Android Nightmare!

North Korean hackers are misusing Google’s Find Hub tool to track South Korean targets and reset Android devices remotely. By hijacking KakaoTalk accounts, they’re spreading malware and causing chaos. To counteract these digital shenanigans, users should enable multi-factor authentication and verify file senders like they owe you money!

Pro Dashboard

Hot Take:

North Korean hackers have taken the phrase “finders keepers” to a whole new level—using Google’s Find Hub like a high-tech game of hide-and-seek, except this time, it’s your personal data they’re after. Who knew GPS tracking and factory resetting Android devices could become the cybercriminals’ new favorite party trick?

Key Points:

  • North Korean hackers are exploiting Google’s Find Hub to track GPS locations and reset Android devices.
  • Attacks primarily target South Koreans via KakaoTalk messenger.
  • The malicious activity is linked to the KONNI activity cluster associated with North Korean hacker groups APT37 and Kimsuky.
  • The infection chain starts with spear-phishing messages using spoofed government agency identities.
  • Genians recommends enabling multi-factor authentication on Google accounts to mitigate these attacks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?