home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 2301 
 Mike Powell to All 
 More AI malware has been 
 27 Jan 26 09:59:04 
 
TZUTC: -0500
MSGID: 2059.consprcy@1:2320/105 2dde10c3
PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0
TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
FORMAT: flowed
More AI malware has been found - and this time, crypto developers are under
attack

Date:
Mon, 26 Jan 2026 16:45:00 +0000

Description:
KONNI is using AI-generated backdoors to target crypto bros - and security
pros should pay attention.

FULL STORY

Security researchers have found more malware being developed with the help of
Gen AI, as the use of AI tools in cybercrime moves from theory into practice,
and that defenders should also start integrating AI into their tech stack. 

Security outfit Check Point Research (CPR) has detailed KONNI , a known North
Korean state-sponsored threat actor that has been around for more than a
decade. 

According to CPR, KONNI is known for targeting South Korean politicians,
diplomats, academics, and other similar targets. However, after more than a
decade of chasing after political and diplomatic targets, KONNI shifted its
attention towards software developers - specifically, blockchain and crypto
developers.

AI-generated PowerShell backdoor 

CPR says that in the latest campaign, KONNI was mailing IT technicians with
highly convincing phishing lures, attempting to access cloud infrastructure,
source code repositories, APIs, and blockchain-related credentials. 

Those that took the bait deployed an AI-generated PowerShell backdoor that
granted the attackers access to their computers, and through it, to all of 
the secrets stored there. 

A defining aspect of this campaign is the deployment of an AI-generated
PowerShell backdoor, demonstrating how artificial intelligence is 
accelerating malware development and deployment, CPR said in its report. 

Rather than introducing entirely new attack techniques, AI enables faster
iteration, easier customization, and greater flexibility. 

The report also stresses that this means cybersecurity professionals will 
have to change, or evolve, their approach, as well. AI-generated malware can
change faster and to a greater extent, evading traditional, signature-based
detection with ease. 

Organizations should treat development environments as high-value targets, 
CPR concludes. To defend, they should first strengthen phishing prevention
across collaboration and developer workflows. After that, they should protect
development and cloud environments with strong access controls and finally,
use AI-driven threat prevention to block unseen malware early in the attack
chain. 

======================================================================
Link to news story:
https://www.techradar.com/pro/security/more-ai-malware-has-been-found-this-tim
e-targeting-crypto-developers

$$
--- SBBSecho 3.28-Linux
 * Origin: Capitol City Online (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700
SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470
SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45
SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca