Researchers at the Genians Security Center (GSC) have uncovered a sophisticated campaign by the North Korean state-sponsored threat group KONNI. The group is weaponizing Google's legitimate 'Find Hub' service to execute destructive attacks against Android users in South Korea. The attack involves a multi-stage process that begins with social engineering on PCs to steal Google credentials. The attackers then use these credentials to remotely track and wipe the victims' mobile devices. This represents a significant evolution in tactics, where trusted cloud services are abused for malicious ends, bypassing traditional device-based security controls. The primary targets appear to be North Korean defectors and associated human rights organizations.
The KONNI APT group, with known links to other North Korean clusters like Kimsuky and APT37, orchestrated this campaign starting in September 2025. The attack chain is initiated through social engineering, a hallmark of this threat actor. Operators posed as psychological counselors and human rights activists, building trust with their targets before delivering the malware payload. The ultimate goal was not just espionage but the complete destruction of data on the victims' mobile devices, causing significant disruption and potential loss of critical information.
This attack is notable because it does not exploit a vulnerability in Android or Google services. Instead, it abuses legitimate, high-privilege functionality after compromising the user's account credentials through a separate infection vector on a different device (a PC). This cross-platform attack highlights the importance of securing all devices and accounts associated with a user's digital identity.
The attack unfolds as follows:
Initial Delivery (T1566.002 - Spearphishing Link): Attackers engage targets via the KakaoTalk messenger, a popular application in South Korea. They distribute a malicious MSI installer file named Stress Clear.msi disguised as a stress-relief program.
Execution and Persistence (T1204.002 - Malicious File): When the victim runs the MSI file, a legitimate-looking installation window is displayed. In the background, an AutoIt loader script executes, installing malware and establishing persistence on the host PC.
Credential Access (T1555.003 - Credentials from Web Browsers): The initial loader deploys several Remote Access Trojans (RATs), including RemcosRAT, QuasarRAT, and RftRAT. These RATs are used to harvest sensitive information from the infected PC, with a primary focus on stealing saved credentials, cookies, and session tokens for Google accounts from web browsers.
Abuse of Legitimate Service (T1213 - Data from Information Repositories): With the stolen Google credentials, the KONNI operators log into the victim's Google account.
Impact (T1499.004 - Endpoint Denial of Service: System Recovery): The attackers access the 'Find Hub' service. They first use its location tracking feature to monitor the victim's physical movements. Once the victim is confirmed to be away from their device, the attackers trigger the remote data wipe command, which performs a factory reset on the Android phone or tablet, destroying all stored data.
The impact of this campaign is severe and multi-faceted:
This campaign demonstrates that even without exploiting a software vulnerability, threat actors can achieve highly destructive outcomes by compromising user credentials and abusing the powerful, legitimate features of modern cloud-connected ecosystems.
| Type | Value | Description |
|---|---|---|
| File Name | Stress Clear.msi |
Malicious installer file distributed via KakaoTalk. |
| Malware | RemcosRAT v7.0.4 |
Version of RemcosRAT observed in the campaign. |
Stress Clear.msi and associated AutoIt loader scripts. EDR solutions should be configured to detect and block known RATs like RemcosRAT and QuasarRAT.M1032 - Multi-factor Authentication): The single most effective defense against this attack is to enable strong, phishing-resistant MFA on all Google accounts. This would prevent the attackers from logging in even if they successfully steal the password.M1017 - User Training): Train high-risk users to be wary of unsolicited files and links, even from seemingly trusted contacts. Emphasize the danger of installing software from unverified sources.Enabling MFA on Google accounts is the most effective control to prevent unauthorized access even if credentials are stolen.
Educating users, especially high-risk individuals, about social engineering tactics and safe software installation practices can prevent the initial compromise.
Using endpoint protection on PCs can detect and block the RATs used for credential harvesting.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats