KONNI-linked APT abuses Google Find Hub to wipe Android devi... #1565
+204
−87
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the post proves: A KONNI-linked APT ran a Windows-first intrusion that stole Google credentials and abused Google’s Android Find Hub to geolocate victims and repeatedly issue factory resets on registered Android phones/tablets. Wipes were timed to moments when the victim was away, suppressing mobile notifications and enabling rapid secondary distribution of malware via the victim’s already-logged-in KakaoTalk PC session.
Initial access and lures (2025-09-05, 2025...
🔧 Technical Details
Account‑takeover abuse of Android Find Hub. After stealing Google credentials (and clearing alert emails from the linked Naver inbox), browse Google Account → Security → Your devices → Find My Phone → Find Hub, select the device, re‑enter the Google password, and trigger “Erase device.” Repeating wipes keeps phones/tablets offline, suppresses notifications, and hides concurrent operations.
MSI → AutoIt persistence via Task Scheduler masquerade. Deliver a signed MSI that runs
install.batto dropAutoIt3.exeandIoKlTr.au3intoC:\Users\Public\Music, copyschtasks.exetohwpviewer.exe, and create a 1‑minute task “IoKlTr.” Show a decoyerror.vbslanguage‑pack dialog to mislead users while artifacts self‑delete.AutoIt HMAC→AES decryption + process injection. Store RATs inside
.au3files compiled as.a3x; derive AES keys via HMAC, decrypt ...🤖 Agent Actions
I analyzed the blog and HackTricks repository and updated the most relevant page with new, concise, technical content.
What I added
References updated
File modified
Reasoning for placement
No other files needed updating, and no duplicate content existed.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).