North Korean KONNI Group Deploys AI-Generated Malware Against Blockchain Developers

By Bartek

25 Jan 2026 (21 days ago)

2 min read

Share:

North Korean APT group KONNI deployed AI-generated PowerShell backdoors targeting blockchain and cryptocurrency developers in Japan, Australia, and India. Check Point Research published findings on 21 January 2026, documenting the campaign's use of Discord-hosted malicious archives.

North Korean KONNI Group Deploys AI-Generated Malware Against Blockchain Developers

Konni targets blockchain developers with AI

North Korean advanced persistent threat (APT) group KONNI targeted blockchain and cryptocurrency developers with AI-generated malware. The campaign focused on developers in Japan, Australia, and India using Discord as the first delivery channel.

Discord lures and staged infection chain

Attackers sent a Discord link that delivered a ZIP archive to targeted developers. The ZIP contained a legitimate-looking PDF lure, a Windows shortcut file, and additional components that executed a multi-stage infection chain on the victim machine.

The Windows shortcut file triggered scripts that unpacked more files, created a scheduled task, and ran a PowerShell script in memory. This script contacted attacker-controlled servers and prepared a persistent backdoor on the infected system.

AI-generated Powershell backdoor characteristics

Check Point Research identified specific markers that linked the PowerShell backdoor to large language model (LLM) code generation. The script included clear English documentation, modular structure, and instructional placeholders such as the comment “# <– your permanent project UUID”.

The backdoor used a fixed universally unique identifier (UUID) string to identify the project instance on each infected device. It sent system information to a remote server every 13 minutes and waited for further attacker commands.

Historical Konni activity and crypto focus

KONNI has operated since at least 2014 according to earlier threat research from Cisco Talos. Previous campaigns targeted organisations linked to the Korean Peninsula, including diplomatic and government entities connected to South Korea.

Recent operations expanded this focus to the cryptocurrency sector. By aiming at blockchain and crypto developers, KONNI targeted teams that handle code and infrastructure for digital currency projects.

Security implications for blockchain industry

Attackers in this campaign used an AI-generated backdoor as part of their tools against blockchain-related developers. The case documents how AI-generated code already appears in real-world offensive operations linked to North Korea.

Share:
Go back to All News