Konni Group

Threat Actor updated 4 months ago (2024-05-04T16:51:09.536Z)
Download STIX
Preview STIX
The Konni Group, also known as TA406, is a threat actor believed to be associated with North Korean cyberespionage activities. According to cybersecurity firm DuskRise, the group has been involved in sophisticated cyberattacks, including one where they compromised a foreign ministry email account to send a Trojanized .zip file to the Indonesian embassy, making it seem like the email originated from the Russian Embassy in Serbia. The group's activities are not confined to targeting adversaries; despite Russia and North Korea's close ties, Russian government organizations have frequently been on the receiving end of their attacks. The Konni Group's modus operandi often involves working in sync with other North Korean cyberespionage groups such as Kimsuky Group and APT37. They are known for their targeted attacks on Russian foreign policy targets, following a pattern similar to the 2021 campaign uncovered by Lumen and Cluster25 researchers. In October, DCSO researchers revealed that the Konni Group had injected their malware into an installer for Russian tax filling software, Spravki BK, further demonstrating their consistent focus on Russian targets. The group has also shown its capability to compromise software installers, as seen when they obtained packages for Statistika KZU and integrated their malware into the installation process. This tactic allows them to infiltrate systems unnoticed and conduct espionage activities. Their activities highlight the persistent threat posed by state-sponsored cyber-espionage groups, underscoring the need for robust cybersecurity measures within government organizations and critical infrastructure.
Description last updated: 2024-03-06T05:21:43.944Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Ta406
2
TA406, also known as the Konni Group or Kimsuky, is a state-sponsored cybercrime organization based in North Korea. This threat actor has been implicated in numerous cyber espionage activities, targeting entities such as news media organizations, academic institutions, and think tanks. The group gai
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
KONNIUnspecified
2
Konni is a malware, short for malicious software, that poses a significant threat to computer systems and data. It's designed to infiltrate systems surreptitiously through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, Konni can wreak havoc by stealin
Source Document References
Information about the Konni Group Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks
BankInfoSecurity
6 months ago
North Korean Group Seen Snooping on Russian Foreign Ministry
CERT-EU
6 months ago
Les dernières cyberattaques (5 mars 2024) • Cybersécurité OSINT