Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KONNI Adopts AI to Generate PowerShell Backdoors

0
Medium
Published: Thu Jan 22 2026 (01/22/2026, 18:22:30 UTC)
Source: AlienVault OTX General

Description

A North Korea-linked threat actor known as KONNI has been observed conducting a phishing campaign targeting software developers and engineering teams, particularly those with blockchain expertise. The campaign uses AI-generated PowerShell backdoors and targets a broader range of countries in the APAC region. The infection chain begins with a Discord-hosted link downloading a ZIP archive containing a PDF lure and a malicious LNK file. The LNK file deploys additional components, including the AI-generated PowerShell backdoor. The backdoor employs various anti-analysis techniques and establishes persistence through scheduled tasks. This campaign demonstrates KONNI's evolution in tactics and tooling, including the adoption of AI-assisted malware development.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:50:29 UTC

Technical Analysis

KONNI, a North Korea-linked cyber espionage group, has adopted AI-assisted malware development to enhance its phishing campaigns targeting software developers and engineering teams with blockchain expertise. The infection chain initiates via a Discord-hosted URL that downloads a ZIP archive containing a PDF lure and a malicious Windows LNK shortcut file. When executed, the LNK file deploys multiple components, including a PowerShell backdoor generated with AI assistance. This backdoor incorporates various anti-analysis techniques such as obfuscation, anti-debugging, and environment checks to evade detection and analysis. Persistence is achieved through scheduled tasks, allowing the malware to maintain foothold on compromised systems. The campaign leverages social engineering tailored to blockchain developers, increasing the likelihood of successful compromise. The use of AI in malware generation represents a significant advancement in the threat actor's capabilities, enabling rapid development of evasive and customized payloads. Although the campaign is currently focused on the APAC region, the targeting of blockchain professionals suggests potential interest in intellectual property and sensitive development environments globally. The lack of known exploits in the wild indicates the campaign relies on social engineering and delivery mechanisms rather than software vulnerabilities. The campaign's tactics align with MITRE ATT&CK techniques such as T1033 (System Owner/User Discovery), T1132.001 (Data Encoding: Standard Encoding), T1573.001 (Encrypted Channel: Symmetric Cryptography), and T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), among others.

Potential Impact

For European organizations, particularly those involved in blockchain development and software engineering, this threat poses risks including unauthorized access, intellectual property theft, and potential disruption of development workflows. The AI-generated PowerShell backdoor's anti-analysis features complicate detection and incident response, increasing dwell time and potential data exfiltration. Persistence via scheduled tasks can enable long-term access, facilitating espionage or further lateral movement within networks. Given the targeting of blockchain expertise, organizations involved in cryptocurrency, decentralized finance, or blockchain infrastructure could face confidentiality breaches impacting competitive advantage and regulatory compliance. The phishing vector exploiting Discord links may bypass traditional email security controls, requiring enhanced user awareness and endpoint monitoring. While the campaign currently focuses on APAC, the global nature of software development and blockchain ecosystems means European entities could become targets, especially those with cross-regional collaborations or supply chain connections. The medium severity reflects the targeted nature and complexity of the attack, balanced against the lack of widespread exploitation or known vulnerabilities.

Mitigation Recommendations

European organizations should implement targeted defenses including: 1) Enhancing email and messaging platform filtering to detect and block Discord-hosted malicious links and ZIP archives containing suspicious LNK files. 2) Deploying endpoint detection and response (EDR) solutions capable of identifying PowerShell-based backdoors and monitoring for unusual scheduled task creations. 3) Conducting focused security awareness training for software developers and blockchain teams emphasizing the risks of phishing via non-traditional channels like Discord. 4) Applying application whitelisting to restrict execution of unauthorized LNK files and PowerShell scripts. 5) Utilizing threat intelligence feeds to monitor for indicators of compromise related to KONNI and AI-generated malware. 6) Implementing network segmentation to limit lateral movement if a developer workstation is compromised. 7) Regularly auditing scheduled tasks and startup entries for unauthorized persistence mechanisms. 8) Encouraging multi-factor authentication (MFA) on all developer and engineering accounts to reduce credential theft impact. 9) Collaborating with industry groups focused on blockchain security to share intelligence and best practices. These measures go beyond generic advice by focusing on the unique delivery vector, AI-generated payloads, and persistence techniques observed in this campaign.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware"]
Adversary
KONNI
Pulse Id
69726ae65cfcf0a192c03c35
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash002ff972edcda2ff895181bfa1c9cb70
hash0cbd4017870b914c6d543fb529cea2c3
hash1a677e0ce4c10840c09d8d414b3a8f5c
hash2eebb492567f5d4727c2812a151ead68
hash7e2a888794702e475fdca586a136fede
hasha553b78847aea7dbb6746a4ee4b98a3b
hasha56220a0b2a69c6b950693c813ce5fea
hashc3fcb261849b8fab17f8263ae851860b
hashdd91777f53c11cea51c393b6997c0392
hashfdc2a430e9438e2e9290c50cb82fe94b
hash216f256d6d869a0f095f8ff4cceefd3a522d7467
hash2a6c0137aca5d9619520ab2857540d948cb7aa9c
hash41aba0c20a086027eaba307c51f865e957d311a3
hash5809f8a1a0736dc34e5bc1c729148561ea41b896
hash60266c9cde361534710b18d18ba4da67002601f7
hash90c4826d631ef15d529378fd6fa64651aae221a4
hasha5cbe5e99c4379db9ddfa1d1ce3c4f070feb8ddd
hashb0a9cc848de36e1230da132131f46018f0ce2c35
hashc0bb6cc9514e14a697538e362a327ebabeaacda4
hashf9ec5982db1f1719d25337dc045f11cbf9fef959
hash159f81fc57399186503190562f28b2dd430d8cc07303e15e2ec60aee6bca798c
hash1ebc4542905c8d4fd8ac6f6d9fadeef51698e5916f6ce1bcc61dcfdea02758ec
hash20e61936144822399149e651da665eb67b16e90ec824dac3d9eec8a4da42fdd2
hash26356e12aae0a2ab1fd0ec15d49208603d3dd1041d50a0b153ab577319797715
hash26a01ffa237241e31a59f1ff4d62a063f55c97598732d55855cce18b8b27b2d6
hash39fdff2ea1a5e2b6151eccc89ca6d2df33b64e09145768442cec93a578f1760c
hash3b67217507e0c44bd7a4cfafed0e8958d21594c98eec43a999614815a7060410
hash48585baa9f1c2b721bb8c4fbd88eff65f8fa580a662aadcd143bc4fda6590156
hash64e6a852fc2e4d3e357222692eefbf445c2bd9ba654b83e64fe9913f2bb115cc
hash738637fcb82920f418111c0cd83d74d9a0807972a73abfbdc71b7446e5bd6a9d
hash851695cb3807a693aae25c8b9ade20a90eaea6802bc619c1d19d121a92aef7a0
hash856ac810f4a00a7e3fa89aec4c94cc166ae6ccf06c3557e9694f8639223ce25d
hash8647209127d998774179aa889d2fcc664153d73557e2cca5f29c261c48dd8772
hasha1d4272ec0ce88f9c697b3e6c70624ec5f1ad9a83c9e64120b5ee21688365af9
hashaf8ca986a52e312fb85f97b235e4b406d665d7ac09cbdb5e25662d4c508ebad4
hashb15f95d0f269bc1edce0e07635681d7dd478c0daa82c6bfd50c551435eba10ff
hashb411fbe03d429556ced09412dd26dc972ee55cff907bfdb5594fe9e3f1c9f0b2
hashb958d4d6ce65d1c081800fc14e558c34daff3b28cdd45323d05b8d40c4146c3c
hashc040756802a217abf077b2f14effb1ed68e36165fde660fef8ff0cfa2856f25d
hashc2ec24dea46273085daa82e83c1c38f3921c718a61f617a66e8b715d1dcc0f57
hashc3c8d6ea686ad87ca2c6fcb5d76da582078779ed77c7544b4095ecd7616ba39d
hashc79ef37866b2dff0afb9ca07b4a7c381ba0b201341f969269971398b69ade5d5
hashc94e58f134c26c3dc25f69e4da81d75cbf4b4235bcfb40b17754da5fe07aad0a
hashde75afa15029283154cf379bc9bb7459cbcd548ff9d11efe24eb2fde7552af07
hashe57fa2d1d3e2bff9603ce052e51a8d6ee5c6d207633765b401399b136249ca35
hashec8c191ad171cf40461dc870b02f5c4e9904f9fec1191174d524b1fb3cbde47f
hasheec55e9a7f27f2ecaba71735fbd636679783ff60d9019eabf8216beebd47300b
hashf619d63aa8d09bafb13c812bf60f2b9189a8dc696c7cef2f246c6b223222e94c
hashf8e86693916be2178b948418228d116a8f73c7856e11c1f4470b8c413268c6c8
hashfb9f16a8900bae93dd93b5d059a0d2997c1db7198acf731f3acf1696a19eeead
hashfcc9b2ac73a0ca01fb999e6aa1a8bdbd89e632939443bcc9186ae1294089123e

Ip

ValueDescriptionCopy
ip192.144.34.40
ip192.144.34.77
ip223.16.184.105

Threat ID: 69728a2c4623b1157c8ba841

Added to database: 1/22/2026, 8:35:56 PM

Last enriched: 1/22/2026, 8:50:29 PM

Last updated: 1/24/2026, 3:12:49 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats