North Korea’s Sneaky Cyber Wipe: How Google’s Find My Device Became a Hacker’s Delight

North Korean spies have found a new way to torch cyber-spying evidence using Google’s Find My Device. By hijacking this service, they’ve remotely wiped South Korean targets’ Android phones, erasing incriminating data. It’s like a high-stakes game of “I Spy,” but with a factory reset finale, leaving victims with blank phones and bewilderment.

Pro Dashboard

Hot Take:

In a plot twist that makes James Bond look like a clumsy amateur, North Korean cyber-spies have taken a page out of the Boy Scout handbook: always leave things cleaner than you found them. Unfortunately, this means wiping clean the digital existence of their South Korean targets faster than you can say “Kimchi”. Who knew the “Find My Device” feature could be so versatile? It’s like using a fire extinguisher to douse your digital footprint. Bravo, KONNI, you’ve truly redefined spring cleaning!

Key Points:

  • North Korean KONNI group hijacks Google’s “Find My Device” to remotely wipe Android phones.
  • Victims’ devices in South Korea are reset, erasing incriminating data.
  • Attackers use stolen Google credentials to trigger device wipes.
  • Infection spread via KakaoTalk app, using malware-laden files.
  • Genians advises using multifactor authentication for device management tools.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?