North Korea-linked hackers use KakaoTalk to spread malware in staged cyberattack.
A North Korea–linked hacking group known as Konni is reportedly conducting multi-stage cyberattacks that chain email and instant messaging to spread malware, according to a threat intelligence report released on the 16th by Genian Security Center.
The campaign begins with spearphishing disguised as a routine professional message, camouflaged as a notice about appointing a North Korea human rights instructor. The email carries a compressed attachment containing a malicious LNK (shortcut) file. When the recipient opens the archive and double-clicks the LNK, a hidden script executes and the target’s PC becomes infected.

What distinguishes this operation is its use of the victim’s KakaoTalk PC client to broaden the attack. After infection, the attackers harvest account credentials and seize the messenger session, then push the malicious file to the victim’s contacts, leveraging trust within a social circle to maximize reach.
Genian describes this as more than simple data theft; it represents an “account-based re-dissemination” model that exploits trusted relationships to create a multistep chain of infection. The attackers aim to stay dormant on machines long enough to move laterally through the user’s network.

To counter such threats, Genian urges defenders to go beyond basic indicator-based blocks and adopt endpoint detection and response (EDR) strategies that focus on anomalous behavior. Specific recommendations include security guidelines for file transfers via messaging apps, monitoring for abnormal bulk or repeated transfers, and ensuring robust session protections on key devices. The firm also emphasizes user education to recognize icons or attachments that hide executable content, such as shortcuts masquerading as documents.
The implications extend beyond Korea. North Korea–linked groups have targeted international organizations and cross-border supply chains in the past, and the rise of trusted-network-based propagation methods is a global concern. For U.S. readers, the case underscores the vulnerability of multinational operations to credential theft and lateral movement through familiar consumer or enterprise messaging tools, reinforcing the need for comprehensive cyber defense, cross-border information sharing, and resilient supply-chain security.