North Korea-Linked Konni APT Group – Active IOCs
Contents
Major Infostealers RedLine and MetaStealer Disrupted by Dutch Police in Operation Magnus
October 30, 2024Cobalt Strike Malware – Active IOCs
October 30, 2024Major Infostealers RedLine and MetaStealer Disrupted by Dutch Police in Operation Magnus
October 30, 2024Cobalt Strike Malware – Active IOCs
October 30, 2024Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a …
October 30, 2024Cobalt Strike Malware – Active IOCs
October 30, 2024Major Infostealers RedLine and MetaStealer Disrupted by Dutch Police in Operation Magnus
October 30, 2024Cobalt Strike Malware – Active IOCs
October 30, 2024Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a …