In recent weeks, security researchers have detected a campaign aimed at people working in the development of blockchain and cryptomonedas, and the author appears to be a group with North Korean connections known for espionage and sabotage operations: Konni (also traced as Opal Sleet or TA406). The technical analysis, published by Check Point, shows a chain of infection designed to deceive engineers and developers through links on messaging platforms and osfussed files that end up running PowerShell code within the system memory. The ultimate objective is not only intrusion, but access to sensitive assets in the development environment: credentials, infrastructure, access to wallets and, ultimately, cryptomoneda funds. You can read the full report of the researchers at Check Point in this link: research.checkpoint.com - Konni targets developments with AI malware.
The attack chain is subtle and takes advantage of family techniques: the entry is made through a link hosted in Discord that downloads a ZIP with a decoy in PDF format and a malicious (.LNK) direct access. When you open that direct access, a embossed PowerShell charger is fired to extract a DOCX document and a CAB file. Inside the CAB there is a backdoor written in PowerShell, two batch scripts and an executable that tries to avoid User Account Control (UAC). The DOCX is shown so that the victim does not suspect, while one of the batches included is in charge of preparing the installation: it creates work directories, instates a scheduled task that is passed through an OneDrive start and leaves on disk an encrypted script that disfigures the task by means of an XOR operation before running it in memory. The task also erases itself to make it difficult for the forensic detection of the committed equipment.

The backdoor in PowerShell is very obfuscated: the authors have used coding by means of arithmetic operations for chains, dynamic text reconstruction in time of execution and final execution by Invoke- Expression, which prevents static signatures from identifying it easily. But what most attracted the attention of analysts was the procedural signature of the code itself: clean and orderly documentation at the beginning of the script, modular structure and comments that function as template markers, for example indications to replace a "permanent project UUID." This way of marking the code is typical of artifacts generated by large language models when they produce code, and for researchers it is a sign that the sample may have been assisted by IA in its creation.
Before deploying its malicious logic, the binary does environment checks: it reviews hardware, software and user activity to try to detect whether it is in an analysis environment (virtual machines or sandboxes) and generates a unique identifier for the infected machine. From there the bifurca behavior according to the privileges of the process in the host; in any case communication with the command and control server is kept regular and at random intervals, sending basic metadata of the system and waiting for orders. When the server responds with PowerShell code, the backdoor transforms it into a script block and runs it as background work, making it easier to operate flexibly and discreetly.
The attribution to Konni was not made by intuition: the researchers compared formats of launchers, coincidences in names of lures and scripts, and the structure of the execution chain with previous campaigns associated with the actor. Konni has been on the radar of the security community since at least 2014 and has been linked by different teams to activity clusters operating with geopolitical motivations in the Asia and Europe region. In this wave of attacks the samples analyzed came from shipments from Japan, Australia and India, suggesting a regional approach in Asia-Pacific.
Why interest in blockchain developers? A committed development environment can give an attacker direct access to keys, APIs credentials and continuous infrastructure configurations that allow to move or empty digital funds, or insert back doors into legitimate software. For groups with a history of cryptoforeign theft or covert operations, a single host with appropriate permissions can be extremely cost-effective or strategically useful.
If you work in that ecosystem, the recommendations of the experts are two-fold: on the one hand, increasing surveillance and strengthening technical controls; on the other, polishing digital hygiene and operational practices. Avoid following unsolicited links on chat channels, dealing with suspicious LNK and ZIP files received outside official channels, and using PowerShell execution and monitoring policies are practical measures that reduce the attack surface. For the management of secrets and credentials in particular, reference resources such as the OWASP Guide on Secret Management offer good practices that should be integrated into workflows: OWASP - Secrets Management Cheat Sheet. To protect teams from more general lures and phishing campaigns, the UK National Cyber Security Centre maintains practical and accessible advice: NCSC - Phishing guidance.

From detection to mediation, cooperation between security and development teams is essential. The integrity tests of the development environment, key rotation, the use of hardware wallets for critical backgrounds and the principle of less privilege in productive and build environments prevent an intrusion into a workstation from becoming a catastrophic gap. At the infrastructure level, EDR / NGAV solutions that detect PowerShell activities in memory, and controls on programmed tasks and input loads (such as monitoring changes in the registry or in the start folder) help identify chains such as the one described by Check Point.
Security officials should also review the commitment indicators (IoC) shared by researchers and correlate them with internal login to identify activity signals. Check Point has published the artifacts and hashes associated with this campaign in his report, which facilitates proactive search in corporate and academic environments. If you need a direct reading of the technical analysis and the IoC, the check point note is available here: Konni targets developments with AI malware - Check Point Research.
The episode leaves two clear lessons: high-risk groups are adapting their tools to take advantage of automation and language models in malware generation, and traditional espionage targets are expanding into the world of cryptomonedas and development infrastructure. The combination of credible lures, avoidance techniques and code potentially assisted by IA requires a defense that combines technical control, awareness-raising and robust processes to protect keys, pipelines and critical resources.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...