North Korea’s Konni Group has reportedly escalated its cyber espionage tactics by leveraging Google’s legitimate Find Hub service to remotely wipe Android devices, marking a significant and concerning shift in the state-sponsored threat actor’s operational methodology. For more information on similar vulnerabilities, read about a Samsung Zero-Click Vulnerability Exploited, Deploying LANDFALL Spyware.
This sophisticated campaign, identified in early September 2025 by the Genians Security Center (GSC), targets both Android and Windows users with the dual objectives of data theft and sustained remote control. You may also be interested in a Critical Security Flaw Discovered in TOZED ZLT T10 Routers, Threatening Network Stability. The exploitation of a widely used legitimate tool for destructive purposes underscores the evolving landscape of state-backed cyber threats and the challenges in defending against them.
The attack chain typically initiates with meticulously crafted spear-phishing emails, often impersonating psychological counselors, North Korean human rights activists, or even the National Tax Service. These deceptive communications aim to establish initial access, subsequently utilizing active KakaoTalk chat sessions to disseminate malicious payloads. These payloads, disguised as innocuous ZIP archives containing “stress-relief programs,” ultimately deploy the potent Lilith Remote Access Trojan (RAT). Lilith RAT grants the attackers extensive control, enabling covert keylogging, screen capturing, file exfiltration, and arbitrary remote code execution, sometimes maintaining a clandestine presence on compromised systems for over a year.
The Konni Group, known by various aliases including Earth Imp and Opal Sleet, is a state-sponsored entity with documented ties to the North Korean regime, often associated with the Kimsuky or APT37 groups. While assessed as distinct, reports from the Multilateral Sanctions Monitoring Team (MSMT) link them to the 63 Research Center and broader North Korean reconnaissance efforts. Historically, Konni has relied on weaponized documents and archives to deploy bespoke malware for intelligence gathering and data exfiltration, with recent activities also observed targeting entities within Ukraine.
The novel element in these campaigns is the weaponization of Google’s Find Hub, a service primarily designed to help users locate, lock, or erase a lost or stolen Android device. By exploiting this legitimate functionality, Konni gains the unprecedented ability to remotely factory reset victim devices, resulting in the complete and unauthorized deletion of personal data. This tactic highlights a concerning trend where threat actors repurpose trust-worthy tools for malicious ends, complicating detection and defense strategies.
In response to these advanced threats, cybersecurity experts, including the Genians Security Center, recommend the implementation of robust Endpoint Detection and Response (EDR) solutions to bolster real-time behavior-based detection and enhance monitoring capabilities against evolving threat indicators.

