North Korea’s Sneaky Cyber Wipe: How Google’s Find My Device Became a Hacker’s Delight
North Korean spies have found a new way to torch cyber-spying evidence using Google’s Find My Device. By hijacking this service, they’ve remotely wiped South Korean targets’ Android phones, erasing incriminating data. It’s like a high-stakes game of “I Spy,” but with a factory reset finale, leaving victims with blank phones and bewilderment.

Hot Take:
In a plot twist that makes James Bond look like a clumsy amateur, North Korean cyber-spies have taken a page out of the Boy Scout handbook: always leave things cleaner than you found them. Unfortunately, this means wiping clean the digital existence of their South Korean targets faster than you can say “Kimchi”. Who knew the “Find My Device” feature could be so versatile? It’s like using a fire extinguisher to douse your digital footprint. Bravo, KONNI, you’ve truly redefined spring cleaning!
Key Points:
- North Korean KONNI group hijacks Google’s “Find My Device” to remotely wipe Android phones.
- Victims’ devices in South Korea are reset, erasing incriminating data.
- Attackers use stolen Google credentials to trigger device wipes.
- Infection spread via KakaoTalk app, using malware-laden files.
- Genians advises using multifactor authentication for device management tools.
