KONNI Adopts AI to Generate PowerShell Backdoors
A North Korea-linked threat actor known as KONNI has been observed conducting a phishing campaign targeting software developers and engineering teams, particularly those with blockchain expertise. The campaign uses AI-generated PowerShell backdoors and targets a broader range of countries in the APAC region. The infection chain begins with a Discord-hosted link downloading a ZIP archive containing a PDF lure and a malicious LNK file. The LNK file deploys additional components, including the AI-generated PowerShell backdoor. The backdoor employs various anti-analysis techniques and establishes persistence through scheduled tasks. This campaign demonstrates KONNI's evolution in tactics and tooling, including the adoption of AI-assisted malware development.
AI Analysis
Technical Summary
KONNI, a North Korea-linked cyber espionage group, has adopted AI-assisted malware development to enhance its phishing campaigns targeting software developers and engineering teams with blockchain expertise. The infection chain initiates via a Discord-hosted URL that downloads a ZIP archive containing a PDF lure and a malicious Windows LNK shortcut file. When executed, the LNK file deploys multiple components, including a PowerShell backdoor generated with AI assistance. This backdoor incorporates various anti-analysis techniques such as obfuscation, anti-debugging, and environment checks to evade detection and analysis. Persistence is achieved through scheduled tasks, allowing the malware to maintain foothold on compromised systems. The campaign leverages social engineering tailored to blockchain developers, increasing the likelihood of successful compromise. The use of AI in malware generation represents a significant advancement in the threat actor's capabilities, enabling rapid development of evasive and customized payloads. Although the campaign is currently focused on the APAC region, the targeting of blockchain professionals suggests potential interest in intellectual property and sensitive development environments globally. The lack of known exploits in the wild indicates the campaign relies on social engineering and delivery mechanisms rather than software vulnerabilities. The campaign's tactics align with MITRE ATT&CK techniques such as T1033 (System Owner/User Discovery), T1132.001 (Data Encoding: Standard Encoding), T1573.001 (Encrypted Channel: Symmetric Cryptography), and T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), among others.
Potential Impact
For European organizations, particularly those involved in blockchain development and software engineering, this threat poses risks including unauthorized access, intellectual property theft, and potential disruption of development workflows. The AI-generated PowerShell backdoor's anti-analysis features complicate detection and incident response, increasing dwell time and potential data exfiltration. Persistence via scheduled tasks can enable long-term access, facilitating espionage or further lateral movement within networks. Given the targeting of blockchain expertise, organizations involved in cryptocurrency, decentralized finance, or blockchain infrastructure could face confidentiality breaches impacting competitive advantage and regulatory compliance. The phishing vector exploiting Discord links may bypass traditional email security controls, requiring enhanced user awareness and endpoint monitoring. While the campaign currently focuses on APAC, the global nature of software development and blockchain ecosystems means European entities could become targets, especially those with cross-regional collaborations or supply chain connections. The medium severity reflects the targeted nature and complexity of the attack, balanced against the lack of widespread exploitation or known vulnerabilities.
Mitigation Recommendations
European organizations should implement targeted defenses including: 1) Enhancing email and messaging platform filtering to detect and block Discord-hosted malicious links and ZIP archives containing suspicious LNK files. 2) Deploying endpoint detection and response (EDR) solutions capable of identifying PowerShell-based backdoors and monitoring for unusual scheduled task creations. 3) Conducting focused security awareness training for software developers and blockchain teams emphasizing the risks of phishing via non-traditional channels like Discord. 4) Applying application whitelisting to restrict execution of unauthorized LNK files and PowerShell scripts. 5) Utilizing threat intelligence feeds to monitor for indicators of compromise related to KONNI and AI-generated malware. 6) Implementing network segmentation to limit lateral movement if a developer workstation is compromised. 7) Regularly auditing scheduled tasks and startup entries for unauthorized persistence mechanisms. 8) Encouraging multi-factor authentication (MFA) on all developer and engineering accounts to reduce credential theft impact. 9) Collaborating with industry groups focused on blockchain security to share intelligence and best practices. These measures go beyond generic advice by focusing on the unique delivery vector, AI-generated payloads, and persistence techniques observed in this campaign.
Affected Countries
Germany, United Kingdom, Netherlands, France, Sweden
Indicators of Compromise
- hash: 002ff972edcda2ff895181bfa1c9cb70
- hash: 0cbd4017870b914c6d543fb529cea2c3
- hash: 1a677e0ce4c10840c09d8d414b3a8f5c
- hash: 2eebb492567f5d4727c2812a151ead68
- hash: 7e2a888794702e475fdca586a136fede
- hash: a553b78847aea7dbb6746a4ee4b98a3b
- hash: a56220a0b2a69c6b950693c813ce5fea
- hash: c3fcb261849b8fab17f8263ae851860b
- hash: dd91777f53c11cea51c393b6997c0392
- hash: fdc2a430e9438e2e9290c50cb82fe94b
- hash: 216f256d6d869a0f095f8ff4cceefd3a522d7467
- hash: 2a6c0137aca5d9619520ab2857540d948cb7aa9c
- hash: 41aba0c20a086027eaba307c51f865e957d311a3
- hash: 5809f8a1a0736dc34e5bc1c729148561ea41b896
- hash: 60266c9cde361534710b18d18ba4da67002601f7
- hash: 90c4826d631ef15d529378fd6fa64651aae221a4
- hash: a5cbe5e99c4379db9ddfa1d1ce3c4f070feb8ddd
- hash: b0a9cc848de36e1230da132131f46018f0ce2c35
- hash: c0bb6cc9514e14a697538e362a327ebabeaacda4
- hash: f9ec5982db1f1719d25337dc045f11cbf9fef959
- hash: 159f81fc57399186503190562f28b2dd430d8cc07303e15e2ec60aee6bca798c
- hash: 1ebc4542905c8d4fd8ac6f6d9fadeef51698e5916f6ce1bcc61dcfdea02758ec
- hash: 20e61936144822399149e651da665eb67b16e90ec824dac3d9eec8a4da42fdd2
- hash: 26356e12aae0a2ab1fd0ec15d49208603d3dd1041d50a0b153ab577319797715
- hash: 26a01ffa237241e31a59f1ff4d62a063f55c97598732d55855cce18b8b27b2d6
- hash: 39fdff2ea1a5e2b6151eccc89ca6d2df33b64e09145768442cec93a578f1760c
- hash: 3b67217507e0c44bd7a4cfafed0e8958d21594c98eec43a999614815a7060410
- hash: 48585baa9f1c2b721bb8c4fbd88eff65f8fa580a662aadcd143bc4fda6590156
- hash: 64e6a852fc2e4d3e357222692eefbf445c2bd9ba654b83e64fe9913f2bb115cc
- hash: 738637fcb82920f418111c0cd83d74d9a0807972a73abfbdc71b7446e5bd6a9d
- hash: 851695cb3807a693aae25c8b9ade20a90eaea6802bc619c1d19d121a92aef7a0
- hash: 856ac810f4a00a7e3fa89aec4c94cc166ae6ccf06c3557e9694f8639223ce25d
- hash: 8647209127d998774179aa889d2fcc664153d73557e2cca5f29c261c48dd8772
- hash: a1d4272ec0ce88f9c697b3e6c70624ec5f1ad9a83c9e64120b5ee21688365af9
- hash: af8ca986a52e312fb85f97b235e4b406d665d7ac09cbdb5e25662d4c508ebad4
- hash: b15f95d0f269bc1edce0e07635681d7dd478c0daa82c6bfd50c551435eba10ff
- hash: b411fbe03d429556ced09412dd26dc972ee55cff907bfdb5594fe9e3f1c9f0b2
- hash: b958d4d6ce65d1c081800fc14e558c34daff3b28cdd45323d05b8d40c4146c3c
- hash: c040756802a217abf077b2f14effb1ed68e36165fde660fef8ff0cfa2856f25d
- hash: c2ec24dea46273085daa82e83c1c38f3921c718a61f617a66e8b715d1dcc0f57
- hash: c3c8d6ea686ad87ca2c6fcb5d76da582078779ed77c7544b4095ecd7616ba39d
- hash: c79ef37866b2dff0afb9ca07b4a7c381ba0b201341f969269971398b69ade5d5
- hash: c94e58f134c26c3dc25f69e4da81d75cbf4b4235bcfb40b17754da5fe07aad0a
- hash: de75afa15029283154cf379bc9bb7459cbcd548ff9d11efe24eb2fde7552af07
- hash: e57fa2d1d3e2bff9603ce052e51a8d6ee5c6d207633765b401399b136249ca35
- hash: ec8c191ad171cf40461dc870b02f5c4e9904f9fec1191174d524b1fb3cbde47f
- hash: eec55e9a7f27f2ecaba71735fbd636679783ff60d9019eabf8216beebd47300b
- hash: f619d63aa8d09bafb13c812bf60f2b9189a8dc696c7cef2f246c6b223222e94c
- hash: f8e86693916be2178b948418228d116a8f73c7856e11c1f4470b8c413268c6c8
- hash: fb9f16a8900bae93dd93b5d059a0d2997c1db7198acf731f3acf1696a19eeead
- hash: fcc9b2ac73a0ca01fb999e6aa1a8bdbd89e632939443bcc9186ae1294089123e
- ip: 192.144.34.40
- ip: 192.144.34.77
- ip: 223.16.184.105
KONNI Adopts AI to Generate PowerShell Backdoors
Description
A North Korea-linked threat actor known as KONNI has been observed conducting a phishing campaign targeting software developers and engineering teams, particularly those with blockchain expertise. The campaign uses AI-generated PowerShell backdoors and targets a broader range of countries in the APAC region. The infection chain begins with a Discord-hosted link downloading a ZIP archive containing a PDF lure and a malicious LNK file. The LNK file deploys additional components, including the AI-generated PowerShell backdoor. The backdoor employs various anti-analysis techniques and establishes persistence through scheduled tasks. This campaign demonstrates KONNI's evolution in tactics and tooling, including the adoption of AI-assisted malware development.
AI-Powered Analysis
Technical Analysis
KONNI, a North Korea-linked cyber espionage group, has adopted AI-assisted malware development to enhance its phishing campaigns targeting software developers and engineering teams with blockchain expertise. The infection chain initiates via a Discord-hosted URL that downloads a ZIP archive containing a PDF lure and a malicious Windows LNK shortcut file. When executed, the LNK file deploys multiple components, including a PowerShell backdoor generated with AI assistance. This backdoor incorporates various anti-analysis techniques such as obfuscation, anti-debugging, and environment checks to evade detection and analysis. Persistence is achieved through scheduled tasks, allowing the malware to maintain foothold on compromised systems. The campaign leverages social engineering tailored to blockchain developers, increasing the likelihood of successful compromise. The use of AI in malware generation represents a significant advancement in the threat actor's capabilities, enabling rapid development of evasive and customized payloads. Although the campaign is currently focused on the APAC region, the targeting of blockchain professionals suggests potential interest in intellectual property and sensitive development environments globally. The lack of known exploits in the wild indicates the campaign relies on social engineering and delivery mechanisms rather than software vulnerabilities. The campaign's tactics align with MITRE ATT&CK techniques such as T1033 (System Owner/User Discovery), T1132.001 (Data Encoding: Standard Encoding), T1573.001 (Encrypted Channel: Symmetric Cryptography), and T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), among others.
Potential Impact
For European organizations, particularly those involved in blockchain development and software engineering, this threat poses risks including unauthorized access, intellectual property theft, and potential disruption of development workflows. The AI-generated PowerShell backdoor's anti-analysis features complicate detection and incident response, increasing dwell time and potential data exfiltration. Persistence via scheduled tasks can enable long-term access, facilitating espionage or further lateral movement within networks. Given the targeting of blockchain expertise, organizations involved in cryptocurrency, decentralized finance, or blockchain infrastructure could face confidentiality breaches impacting competitive advantage and regulatory compliance. The phishing vector exploiting Discord links may bypass traditional email security controls, requiring enhanced user awareness and endpoint monitoring. While the campaign currently focuses on APAC, the global nature of software development and blockchain ecosystems means European entities could become targets, especially those with cross-regional collaborations or supply chain connections. The medium severity reflects the targeted nature and complexity of the attack, balanced against the lack of widespread exploitation or known vulnerabilities.
Mitigation Recommendations
European organizations should implement targeted defenses including: 1) Enhancing email and messaging platform filtering to detect and block Discord-hosted malicious links and ZIP archives containing suspicious LNK files. 2) Deploying endpoint detection and response (EDR) solutions capable of identifying PowerShell-based backdoors and monitoring for unusual scheduled task creations. 3) Conducting focused security awareness training for software developers and blockchain teams emphasizing the risks of phishing via non-traditional channels like Discord. 4) Applying application whitelisting to restrict execution of unauthorized LNK files and PowerShell scripts. 5) Utilizing threat intelligence feeds to monitor for indicators of compromise related to KONNI and AI-generated malware. 6) Implementing network segmentation to limit lateral movement if a developer workstation is compromised. 7) Regularly auditing scheduled tasks and startup entries for unauthorized persistence mechanisms. 8) Encouraging multi-factor authentication (MFA) on all developer and engineering accounts to reduce credential theft impact. 9) Collaborating with industry groups focused on blockchain security to share intelligence and best practices. These measures go beyond generic advice by focusing on the unique delivery vector, AI-generated payloads, and persistence techniques observed in this campaign.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware"]
- Adversary
- KONNI
- Pulse Id
- 69726ae65cfcf0a192c03c35
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash002ff972edcda2ff895181bfa1c9cb70 | — | |
hash0cbd4017870b914c6d543fb529cea2c3 | — | |
hash1a677e0ce4c10840c09d8d414b3a8f5c | — | |
hash2eebb492567f5d4727c2812a151ead68 | — | |
hash7e2a888794702e475fdca586a136fede | — | |
hasha553b78847aea7dbb6746a4ee4b98a3b | — | |
hasha56220a0b2a69c6b950693c813ce5fea | — | |
hashc3fcb261849b8fab17f8263ae851860b | — | |
hashdd91777f53c11cea51c393b6997c0392 | — | |
hashfdc2a430e9438e2e9290c50cb82fe94b | — | |
hash216f256d6d869a0f095f8ff4cceefd3a522d7467 | — | |
hash2a6c0137aca5d9619520ab2857540d948cb7aa9c | — | |
hash41aba0c20a086027eaba307c51f865e957d311a3 | — | |
hash5809f8a1a0736dc34e5bc1c729148561ea41b896 | — | |
hash60266c9cde361534710b18d18ba4da67002601f7 | — | |
hash90c4826d631ef15d529378fd6fa64651aae221a4 | — | |
hasha5cbe5e99c4379db9ddfa1d1ce3c4f070feb8ddd | — | |
hashb0a9cc848de36e1230da132131f46018f0ce2c35 | — | |
hashc0bb6cc9514e14a697538e362a327ebabeaacda4 | — | |
hashf9ec5982db1f1719d25337dc045f11cbf9fef959 | — | |
hash159f81fc57399186503190562f28b2dd430d8cc07303e15e2ec60aee6bca798c | — | |
hash1ebc4542905c8d4fd8ac6f6d9fadeef51698e5916f6ce1bcc61dcfdea02758ec | — | |
hash20e61936144822399149e651da665eb67b16e90ec824dac3d9eec8a4da42fdd2 | — | |
hash26356e12aae0a2ab1fd0ec15d49208603d3dd1041d50a0b153ab577319797715 | — | |
hash26a01ffa237241e31a59f1ff4d62a063f55c97598732d55855cce18b8b27b2d6 | — | |
hash39fdff2ea1a5e2b6151eccc89ca6d2df33b64e09145768442cec93a578f1760c | — | |
hash3b67217507e0c44bd7a4cfafed0e8958d21594c98eec43a999614815a7060410 | — | |
hash48585baa9f1c2b721bb8c4fbd88eff65f8fa580a662aadcd143bc4fda6590156 | — | |
hash64e6a852fc2e4d3e357222692eefbf445c2bd9ba654b83e64fe9913f2bb115cc | — | |
hash738637fcb82920f418111c0cd83d74d9a0807972a73abfbdc71b7446e5bd6a9d | — | |
hash851695cb3807a693aae25c8b9ade20a90eaea6802bc619c1d19d121a92aef7a0 | — | |
hash856ac810f4a00a7e3fa89aec4c94cc166ae6ccf06c3557e9694f8639223ce25d | — | |
hash8647209127d998774179aa889d2fcc664153d73557e2cca5f29c261c48dd8772 | — | |
hasha1d4272ec0ce88f9c697b3e6c70624ec5f1ad9a83c9e64120b5ee21688365af9 | — | |
hashaf8ca986a52e312fb85f97b235e4b406d665d7ac09cbdb5e25662d4c508ebad4 | — | |
hashb15f95d0f269bc1edce0e07635681d7dd478c0daa82c6bfd50c551435eba10ff | — | |
hashb411fbe03d429556ced09412dd26dc972ee55cff907bfdb5594fe9e3f1c9f0b2 | — | |
hashb958d4d6ce65d1c081800fc14e558c34daff3b28cdd45323d05b8d40c4146c3c | — | |
hashc040756802a217abf077b2f14effb1ed68e36165fde660fef8ff0cfa2856f25d | — | |
hashc2ec24dea46273085daa82e83c1c38f3921c718a61f617a66e8b715d1dcc0f57 | — | |
hashc3c8d6ea686ad87ca2c6fcb5d76da582078779ed77c7544b4095ecd7616ba39d | — | |
hashc79ef37866b2dff0afb9ca07b4a7c381ba0b201341f969269971398b69ade5d5 | — | |
hashc94e58f134c26c3dc25f69e4da81d75cbf4b4235bcfb40b17754da5fe07aad0a | — | |
hashde75afa15029283154cf379bc9bb7459cbcd548ff9d11efe24eb2fde7552af07 | — | |
hashe57fa2d1d3e2bff9603ce052e51a8d6ee5c6d207633765b401399b136249ca35 | — | |
hashec8c191ad171cf40461dc870b02f5c4e9904f9fec1191174d524b1fb3cbde47f | — | |
hasheec55e9a7f27f2ecaba71735fbd636679783ff60d9019eabf8216beebd47300b | — | |
hashf619d63aa8d09bafb13c812bf60f2b9189a8dc696c7cef2f246c6b223222e94c | — | |
hashf8e86693916be2178b948418228d116a8f73c7856e11c1f4470b8c413268c6c8 | — | |
hashfb9f16a8900bae93dd93b5d059a0d2997c1db7198acf731f3acf1696a19eeead | — | |
hashfcc9b2ac73a0ca01fb999e6aa1a8bdbd89e632939443bcc9186ae1294089123e | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip192.144.34.40 | — | |
ip192.144.34.77 | — | |
ip223.16.184.105 | — |
Threat ID: 69728a2c4623b1157c8ba841
Added to database: 1/22/2026, 8:35:56 PM
Last enriched: 1/22/2026, 8:50:29 PM
Last updated: 1/24/2026, 3:12:49 PM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Watering Hole Attack Targets EmEditor Users With Information-Stealing Malware
MediumSandworm behind cyberattack on Poland's power grid in late 2025
MediumRestless Spirit: New Attacks on Russian Companies
MediumTracking the VS Code Tasks Infection Vector
MediumOsiris: New Ransomware, Experienced Attackers?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.