North Korea-Linked Konni APT Group – Active IOCs
Contents
AsyncRAT – Active IOCs
January 7, 2025CVE-2025-22395 – Dell Update Package Framework Vulnerability
January 7, 2025AsyncRAT – Active IOCs
January 7, 2025CVE-2025-22395 – Dell Update Package Framework Vulnerability
January 7, 2025Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a significant code overlap with the NOKKI malware family. Konni's APT Group continues to attack …
January 7, 2025CVE-2025-22395 – Dell Update Package Framework Vulnerability
January 7, 2025AsyncRAT – Active IOCs
January 7, 2025CVE-2025-22395 – Dell Update Package Framework Vulnerability
January 7, 2025Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a significant code overlap with the NOKKI malware family. Konni's APT Group continues to attack …
IoC
http://subscheme.info/list.php?638717886940284577=MZdH609gkqSrlx3ijeQ7xnNORNtV
http://subscheme.info/list.php?638717886947785015=HErmbUWADGaRkmxbj3oD/yRkmN3R
http://subscheme.info/upload.php
3024b5438f5d63cdedb1c473cba07b1825b60a1f
c8556d5dd6383b600a459a531beb05ff
4cd7e92ac6a3d068683d41beabd82d82267d97aa89603c708c0dd4af637d6d67
http://subscheme.info/list.php?638717886947785015=HErmbUWADGaRkmxbj3oD/yRkmN3R
http://subscheme.info/upload.php
3024b5438f5d63cdedb1c473cba07b1825b60a1f
c8556d5dd6383b600a459a531beb05ff
4cd7e92ac6a3d068683d41beabd82d82267d97aa89603c708c0dd4af637d6d67