HomeSample Page

Sample Page Title


North Korea

The state-backed North Korean menace group Konni (Opal Sleet, TA406) was noticed focusing on Ukrainian authorities entities in intelligence assortment operations.

The attackers use phishing emails that impersonate assume tanks, referencing essential political occasions or army developments to lure their targets.

Proofpoint researchers who found the exercise in February 2025 counsel that it is probably an effort to help the DPRK’s army involvement alongside Russia in Ukraine and consider the political standing underpinning the battle.

“Proofpoint assesses TA406 is focusing on Ukrainian authorities entities to raised perceive the urge for food to proceed combating in opposition to the Russian invasion and assess the medium-term outlook of the battle,” clarify the researchers.

“North Korea dedicated troops to help Russia within the fall of 2024, and TA406 could be very probably gathering intelligence to assist North Korean management decide the present danger to its forces already within the theatre, in addition to the chance that Russia will request extra troops or armaments.”

Assault chain

The malicious emails despatched to targets impersonate members of fictitious assume tanks, coping with key points like latest dismissals of army leaders or presidential elections in Ukraine.

The attackers use freemail providers like Gmail, ProtonMail, and Outlook to repeatedly ship messages to their targets, urging them to click on on the hyperlink.

Phishing email used in the Konni attacks
Phishing e-mail used within the Konni assaults
Supply: Proofpoint

Doing so takes the victims to a MEGA-hosted obtain that drops a password-protected .RAR archive (Analytical Report.rar) on their programs, containing a .CHM file with the identical title.

Opening that triggers embedded PowerShell that downloads the next-stage PowerShell, which captures reconnaissance information from the contaminated host, and establishes persistence.

Proofpoint has additionally seen variants that make use of HTML attachments dropping ZIP archives containing benign PDFs and malicious LNK information, resulting in PowerShell and VBScript execution.

Encoded PowerShell in the LNK file
Encoded PowerShell within the LNK file
Supply: Proofpoint

Proofpoint couldn’t retrieve the ultimate payload in these assaults, which is believed to be some form of malware/backdoor that facilitates espionage operations.

The researchers additionally famous that Konni executed preparational assaults earlier, focusing on the identical individuals and making an attempt to reap account credentials they might use to hijack accounts.

These makes an attempt concerned emails spoofing Microsoft safety alerts, claiming “uncommon sign-in exercise,” and asking the recipient to confirm their login on a phishing website at “jetmf[.]com.”

Fake Microsoft security alert
Faux Microsoft safety alert
Supply: Proofpoint

North Korea’s focusing on of Ukrainian authorities entities provides a brand new dimension to the nation’s already advanced cybersecurity battlefield, which has been dominated by relentless Russian state-sponsored assaults because the begin of the invasion.

Based mostly on an evaluation of 14M malicious actions, uncover the highest 10 MITRE ATT&CK methods behind 93% of assaults and find out how to defend in opposition to them.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles