• bitcoinBitcoin (BTC) $ 66,886.00
  • ethereumEthereum (ETH) $ 2,020.88
  • tetherTether (USDT) $ 0.999334
  • bnbBNB (BNB) $ 616.20
  • xrpXRP (XRP) $ 1.35
  • usd-coinUSDC (USDC) $ 0.999733
  • solanaSolana (SOL) $ 83.32
  • tronTRON (TRX) $ 0.318196
  • staked-etherLido Staked Ether (STETH) $ 2,265.05
  • figure-helocFigure Heloc (FIGR_HELOC) $ 1.02
  • dogecoinDogecoin (DOGE) $ 0.092538
  • usdsUSDS (USDS) $ 0.999739
  • whitebitWhiteBIT Coin (WBT) $ 51.75
  • bitcoin-cashBitcoin Cash (BCH) $ 482.85
  • hyperliquidHyperliquid (HYPE) $ 39.72
  • wrapped-stethWrapped stETH (WSTETH) $ 2,779.67
  • cardanoCardano (ADA) $ 0.250260
  • leo-tokenLEO Token (LEO) $ 9.58
  • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 76,243.00
  • moneroMonero (XMR) $ 331.17
  • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.998762
  • chainlinkChainlink (LINK) $ 8.60
  • wrapped-beacon-ethWrapped Beacon ETH (WBETH) $ 2,466.93
  • canton-networkCanton (CC) $ 0.155513
  • ethena-usdeEthena USDe (USDE) $ 0.999184
  • stellarStellar (XLM) $ 0.170563
  • wrapped-eethWrapped eETH (WEETH) $ 2,465.31
  • usd1-wlfiUSD1 (USD1) $ 0.999552
  • daiDai (DAI) $ 0.999901
  • susdssUSDS (SUSDS) $ 1.08
  • litecoinLitecoin (LTC) $ 54.17
  • rainRain (RAIN) $ 0.008323
  • hedera-hashgraphHedera (HBAR) $ 0.090739
  • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 76,366.00
  • memecoreMemeCore (M) $ 2.22
  • paypal-usdPayPal USD (PYUSD) $ 0.999695
  • avalanche-2Avalanche (AVAX) $ 8.90
  • wethWETH (WETH) $ 2,268.37
  • zcashZcash (ZEC) $ 218.53
  • shiba-inuShiba Inu (SHIB) $ 0.000006
  • suiSui (SUI) $ 0.883982
  • usdt0USDT0 (USDT0) $ 0.998824
  • the-open-networkToncoin (TON) $ 1.25
  • bittensorBittensor (TAO) $ 320.77
  • crypto-com-chainCronos (CRO) $ 0.072300
  • world-liberty-financialWorld Liberty Financial (WLFI) $ 0.099630
  • hashnote-usycCircle USYC (USYC) $ 1.12
  • tether-goldTether Gold (XAUT) $ 4,488.66
  • pax-goldPAX Gold (PAXG) $ 4,500.40
  • ethena-staked-usdeEthena Staked USDe (SUSDE) $ 1.22
  • mantleMantle (MNT) $ 0.680469
  • uniswapUniswap (UNI) $ 3.44
  • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
  • polkadotPolkadot (DOT) $ 1.28
  • pi-networkPi Network (PI) $ 0.180967
  • global-dollarGlobal Dollar (USDG) $ 0.999868
  • okbOKB (OKB) $ 83.86
  • falcon-financeFalcon USD (USDF) $ 0.998765
  • aster-2Aster (ASTER) $ 0.659391
  • skySky (SKY) $ 0.070035
  • htx-daoHTX DAO (HTX) $ 0.000002
  • syrupusdcsyrupUSDC (SYRUPUSDC) $ 1.15
  • nearNEAR Protocol (NEAR) $ 1.19
  • aaveAave (AAVE) $ 98.13
  • pepePepe (PEPE) $ 0.000003
  • ripple-usdRipple USD (RLUSD) $ 0.999843
  • bitget-tokenBitget Token (BGB) $ 1.94
  • ondo-financeOndo (ONDO) $ 0.275328
  • bfusdBFUSD (BFUSD) $ 0.999000
  • ondo-us-dollar-yieldOndo US Dollar Yield (USDY) $ 1.12
  • ethereum-classicEthereum Classic (ETC) $ 8.16
  • internet-computerInternet Computer (ICP) $ 2.26
  • siren-2Siren (SIREN) $ 1.70
  • gatechain-tokenGate (GT) $ 6.55
  • janus-henderson-anemoy-treasury-fundJanus Henderson Anemoy Treasury Fund (JTRSY) $ 1.10
  • kucoin-sharesKuCoin (KCS) $ 7.97
  • quant-networkQuant (QNT) $ 70.94
  • jupiter-perpetuals-liquidity-provider-tokenJupiter Perpetuals Liquidity Provider Token (JLP) $ 4.00
  • pump-funPump.fun (PUMP) $ 0.001737
  • polygon-ecosystem-tokenPOL (ex-MATIC) (POL) $ 0.092577
  • kaspaKaspa (KAS) $ 0.035039
  • eutblSpiko EU T-Bills Money Market Fund (EUTBL) $ 1.21
  • nexoNEXO (NEXO) $ 0.881535
  • jito-staked-solJito Staked SOL (JITOSOL) $ 124.46
  • render-tokenRender (RENDER) $ 1.70
  • usdtbUSDtb (USDTB) $ 0.999567
  • kelp-dao-restaked-ethKelp DAO Restaked ETH (RSETH) $ 2,404.69
  • midnight-3Midnight (NIGHT) $ 0.051455
  • worldcoin-wldWorldcoin (WLD) $ 0.274610
  • binance-peg-wethBinance-Peg WETH (WETH) $ 2,262.26
  • cosmosCosmos Hub (ATOM) $ 1.69
  • rocket-pool-ethRocket Pool ETH (RETH) $ 2,631.35
  • morphoMorpho (MORPHO) $ 1.49
  • ethenaEthena (ENA) $ 0.093668
  • binance-bridged-usdc-bnb-smart-chainBinance Bridged USDC (BNB Smart Chain) (USDC) $ 0.999945
  • usddUSDD (USDD) $ 0.998460
  • aptosAptos (APT) $ 0.943657
  • wbnbWrapped BNB (WBNB) $ 759.61
  • superstate-short-duration-us-government-securities-fund-ustbSuperstate Short Duration U.S. Government Securities Fund (USTB) (USTB) $ 11.03
  • ignition-fbtcFunction FBTC (FBTC) $ 76,389.00
  • algorandAlgorand (ALGO) $ 0.083147
  • hash-2Provenance Blockchain (HASH) $ 0.013066
  • official-trumpOfficial Trump (TRUMP) $ 2.99
  • flare-networksFlare (FLR) $ 0.007847
  • filecoinFilecoin (FIL) $ 0.825484
  • syrupusdtsyrupUSDT (SYRUPUSDT) $ 1.11
  • beldexBeldex (BDX) $ 0.081943
  • ousgOUSG (OUSG) $ 114.73
  • xdce-crowd-saleXDC Network (XDC) $ 0.030959
  • binance-staked-solBinance Staked SOL (BNSOL) $ 108.24
  • yldsYLDS (YLDS) $ 0.999959
  • ghoGHO (GHO) $ 0.999101
  • vechainVeChain (VET) $ 0.006788
  • stable-2​​Stable (STABLE) $ 0.026264
  • usual-usdUsual USD (USD0) $ 0.998550
  • fetch-aiArtificial Superintelligence Alliance (FET) $ 0.246356
  • new-x-ceo-is-backNEW X CEO IS BACK (XFLOKI) $ 0.506041
  • bridged-usdc-polygon-pos-bridgePolygon Bridged USDC (Polygon PoS) (USDC.E) $ 0.999720
  • arbitrumArbitrum (ARB) $ 0.092002
  • solv-btcSolv Protocol BTC (SOLVBTC) $ 76,461.00
  • justJUST (JST) $ 0.059446
  • lombard-staked-btcLombard Staked BTC (LBTC) $ 76,491.00
  • jupiter-exchange-solanaJupiter (JUP) $ 0.146390
  • bonkBonk (BONK) $ 0.000006
  • layerzeroLayerZero (ZRO) $ 2.03
  • clbtcclBTC (CLBTC) $ 76,920.00
  • true-usdTrueUSD (TUSD) $ 0.997414
  • a7a5A7A5 (A7A5) $ 0.012293
  • fasttokenFasttoken (FTN) $ 1.09
  • pancakeswap-tokenPancakeSwap (CAKE) $ 1.39
  • virtual-protocolVirtuals Protocol (VIRTUAL) $ 0.672038
  • euro-coinEURC (EURC) $ 1.15
  • stakewise-v3-osethStakeWise Staked ETH (OSETH) $ 2,419.84
  • chilizChiliz (CHZ) $ 0.040789
  • blockstackStacks (STX) $ 0.225559
  • kinetic-staked-hypeKinetiq Staked HYPE (KHYPE) $ 33.97
  • tbtctBTC (TBTC) $ 70,942.00
  • pudgy-penguinsPudgy Penguins (PENGU) $ 0.006530
  • dashDash (DASH) $ 32.37
  • wrappedm-by-m0WrappedM by M0 (WM) $ 1.00
  • first-digital-usdFirst Digital USD (FDUSD) $ 0.999095
  • janus-henderson-anemoy-aaa-clo-fundJanus Henderson Anemoy AAA CLO Fund (JAAA) $ 1.03
  • noonNoon (NOON) $ 1.30
  • tezosTezos (XTZ) $ 0.350143
  • sei-networkSei (SEI) $ 0.054730
  • c8ntinuumc8ntinuum (CTM) $ 0.087592
  • ether-fiEther.fi (ETHFI) $ 0.465807
  • decredDecred (DCR) $ 20.95
  • mantle-staked-etherMantle Staked Ether (METH) $ 2,455.82
  • hastra-primePRIME (PRIME) $ 1.03
  • usxUSX (USX) $ 0.999419
  • polygon-pos-bridged-dai-polygon-posPolygon PoS Bridged DAI (Polygon POS) (DAI) $ 0.999983
  • kinesis-goldKinesis Gold (KAU) $ 146.14
  • resolv-wstusrResolv wstUSR (WSTUSR) $ 1.13
  • dexeDeXe (DEXE) $ 7.11
  • cocaCOCA (COCA) $ 1.30
  • sun-tokenSun Token (SUN) $ 0.017287
  • apenftAINFT (NFT) $ 0.00000033
  • adi-tokenADI (ADI) $ 4.05
  • liquid-staked-ethereumLiquid Staked ETH (LSETH) $ 2,406.26
  • curve-dao-tokenCurve DAO (CRV) $ 0.215546
  • arbitrum-bridged-wbtc-arbitrum-oneArbitrum Bridged WBTC (Arbitrum One) (WBTC) $ 76,200.00
  • gnosisGnosis (GNO) $ 119.29
  • bittorrentBitTorrent (BTT) $ 0.00000032
  • usdaiUSDai (USDAI) $ 0.999504
  • kite-2Kite (KITE) $ 0.170732
  • wrapped-flareWrapped Flare (WFLR) $ 0.009961
  • aerodrome-financeAerodrome Finance (AERO) $ 0.326736
  • conflux-tokenConflux (CFX) $ 0.057980
  • l2-standard-bridged-weth-baseL2 Standard Bridged WETH (Base) (WETH) $ 2,266.86
  • injective-protocolInjective (INJ) $ 2.89
  • steakhouse-usdc-morpho-vaultSteakhouse USDC Morpho Vault (STEAKUSDC) $ 1.12
  • riverRiver (RIVER) $ 14.61
  • fraxLegacy Frax Dollar (FRAX) $ 0.996364
  • bitcoin-svBitcoin SV (BSV) $ 13.69
  • flokiFLOKI (FLOKI) $ 0.000028
  • kaiaKaia (KAIA) $ 0.046307
  • binance-peg-xrpBinance-Peg XRP (XRP) $ 1.59
  • celestiaCelestia (TIA) $ 0.301916
  • ether-fi-liquid-ethEther.Fi Liquid ETH (LIQUIDETH) $ 2,443.47
  • venice-tokenVenice Token (VVV) $ 5.99
  • renzo-restaked-ethRenzo Restaked ETH (EZETH) $ 2,421.84
  • lido-daoLido DAO (LDO) $ 0.312852
  • jasmycoinJasmyCoin (JASMY) $ 0.005341
  • sbtc-2sBTC (SBTC) $ 77,039.00
  • crvusdcrvUSD (CRVUSD) $ 0.992558
  • official-foOfficial FO (FO) $ 0.262821
  • the-graphThe Graph (GRT) $ 0.024129
  • jupiter-staked-solJupiter Staked SOL (JUPSOL) $ 115.56
  • kinesis-silverKinesis Silver (KAG) $ 68.77
  • savings-usddSavings USDD (SUSDD) $ 1.03
  • spx6900SPX6900 (SPX) $ 0.278497
  • monadMonad (MON) $ 0.023454
  • ape-and-pepeApe and Pepe (APEPE) $ 0.000001
  • msolMarinade Staked SOL (MSOL) $ 133.18
  • doublezeroDoubleZero (2Z) $ 0.070840
  • arbitrum-bridged-weth-arbitrum-oneArbitrum Bridged WETH (Arbitrum One) (WETH) $ 2,265.06
  • iotaIOTA (IOTA) $ 0.055917
  • olympusOlympus (OHM) $ 15.55
  • syrupMaple Finance (SYRUP) $ 0.207695

North Korea-backed group hijacks Google’s Find Hub in credential theft campaign

0 0


The North Korean hacker group Konni has discovered a new set of attacks that, for the first time, use Google’s Find Hub asset tracking feature. The attacks target both Android and Windows devices to steal data and gain remote control.

The activity detected in early September 2025 revealed that the attacks can exploit Google’s asset tracking services Find Hub, thereby leading to the unauthorized deletion of personal data.

The hack starts with an attack chain in which Konni sends spear-phishing emails to targets to get access to their computers. They then use the targets’ logged-in KakaoTalk chat app sessions to send malicious payloads to their contacts in the form of a ZIP archive.

The Genians Security Centre (GSC) in a technical report stated, “Attackers impersonated psychological counsellors and North Korean human rights activists, distributing malware disguised as stress-relief programs.”

South Korean cybersecurity group says malware is for Korea-focused operations

According to investigators, the spear-phishing emails appear to originate from legitimate companies, such as the National Tax Service. This trick fools users into opening malicious attachments that contain remote access trojans, such as Lilith RAT, which can take control of compromised computers and send additional payloads.

The threat actor can stay hidden in the compromised computer for over a year, spying via the webcam and operating the system when the user is absent. GSC stated, “In this process, the access obtained during the initial intrusion enables system control and additional information collection, while evasion tactics allow long-term concealment.”

Konni attack flow. Source: The Hacker News

Hackers can steal the victim’s Google and Naver account credentials. After getting their hands on the stolen Google passwords, the hackers use them to log in to Google’s Find Hub and wipe their devices remotely.

For instance, these hackers logged into a recovery email account listed under Naver, and they deleted Google security alert emails. Additionally, they emptied the trash folder in the inbox to conceal their tracks.

The hackers are also using a ZIP file. It is propagated via the messaging app containing a malicious Microsoft Installer (MSI) package called “Stress Clear.msi”. This package uses a legal signature provided to a Chinese company to authenticate the application’s appearance. Once it’s started, it uses a batch script to do the basic setup.

It then runs a Visual Basic Script (VBScript) that displays a fake error message about a language pack compatibility issue while the malicious commands are executed in the background.

The malware is similar to Lilith RAT in some ways, but it has been given the code name EndRAT (also known as EndClient RAT by security researcher Ovi Liber) due to the changes that have been identified.

Genians stated that the Konni APT actors also used an AutoIt script to initiate the Remcos RAT version 7.0.4, which was publicly disclosed on September 10, 2025, by the group responsible for its maintenance. Now, hackers are using newer versions of the Trojan in their attacks. Quasar RAT and RftRAT, another trojan used by Kimsuky in 2023, have also been found on target devices.

The South Korean cybersecurity company said, “This suggests that the malware is tailored to Korea-focused operations and that obtaining relevant data and conducting in-depth analysis requires substantial effort.”

North Korea-backed hackers’ impetus grows

This attack is definitely a follow-up to the Konni APT campaign, which is tied to the Kimsuky and APT 37 groups that the North Korean government backs.

At the same time, ENKI revealed that the Lazarus Group used an updated version of the Comebacker malware in attacks against defense and aerospace companies using specially made Microsoft Word documents as bait as part of an espionage operation. They claim to be from Airbus, the Edge Group, and the Indian Institute of Technology Kanpur to deceive people.

Meanwhile, as reported by Cryptopolitan, Second Vice Foreign Minister Kim Ji-na announced that South Korea is considering sanctions against North Korea over rampant cryptocurrency crime, and that cooperation with the US is critical.



Source link

Leave A Reply

Your email address will not be published.