Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsKonni Hackers Target Blockchain Engineers with AI-Built Malware
Konni Hackers Target Blockchain Engineers with AI-Built Malware
CybersecurityAICrypto

Konni Hackers Target Blockchain Engineers with AI-Built Malware

•January 24, 2026
0
BleepingComputer
BleepingComputer•Jan 24, 2026

Companies Mentioned

Check Point Software

Check Point Software

CHKP

Discord

Discord

Why It Matters

Compromising blockchain engineers gives attackers direct access to crypto wallets and API credentials, threatening financial assets and ecosystem integrity. The AI‑driven approach makes detection harder, raising the risk profile for the entire blockchain sector.

Key Takeaways

  • •Konni uses AI‑generated PowerShell malware.
  • •Targets blockchain developers via Discord phishing links.
  • •LNK shortcut delivers obfuscated backdoor with XOR‑encrypted script.
  • •Malware includes UAC bypass and scheduled task persistence.
  • •AI‑assisted code shows structured comments and modular layout.

Pulse Analysis

The resurgence of AI‑assisted threat actors has added a new layer of sophistication to cyber‑espionage, and North Korea’s Konni group exemplifies this trend. Active since 2014, Konni—also known as Opal Sleet or TA406—has shifted its focus to the rapidly expanding blockchain ecosystem, where developers hold valuable cryptographic keys and API credentials. The latest campaign leverages Discord‑hosted links that deliver a ZIP archive containing a PDF lure and a malicious LNK shortcut. By exploiting the trust placed in developer communities, the actors gain an initial foothold in high‑value environments across the Asia‑Pacific region.

Once the shortcut is executed, an embedded PowerShell loader extracts a DOCX file and a CAB archive that houses a heavily obfuscated PowerShell backdoor, two batch scripts, and a UAC‑bypass executable. The backdoor employs arithmetic‑based string encoding, XOR‑encrypted payloads, and runtime reconstruction before executing commands via Invoke‑Expression. Analysts at Check Point note distinctive AI‑generated artifacts: clean modular structure, explicit documentation comments, and placeholder UUID instructions—hallmarks of large language model code generation. The malware also performs environment checks, creates a staged directory, and registers a scheduled task masquerading as OneDrive to maintain persistence.

The emergence of AI‑crafted malware raises the bar for detection, as traditional signature‑based tools struggle against dynamically generated code. For blockchain firms, the stakes are especially high: compromised development environments can expose wallet keys, smart‑contract code, and transaction APIs, potentially leading to direct financial loss. Organizations should adopt multi‑layered defenses, including strict validation of executable shortcuts, sandboxing of PowerShell scripts, and continuous monitoring for anomalous scheduled tasks. Sharing indicators of compromise and threat intelligence, as Check Point has done, remains essential to mitigate this evolving threat vector.

Konni hackers target blockchain engineers with AI-built malware

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...