In a chilling escalation of cyber espionage, North Korean hackers have transformed Google’s innocuous Find My Device feature into a potent tool for remote data destruction. Dubbed ‘Find Hub’ in some reports, this service—intended to help users locate lost Android phones—has been weaponized by the state-backed KONNI group to erase evidence and disrupt targets, primarily in South Korea.
The campaign, uncovered by South Korean cybersecurity firm Genians, reveals a sophisticated operation where attackers hijack victims’ Google accounts to trigger factory resets on Android devices. This not only wipes data but also tracks GPS locations, blending surveillance with sabotage in a seamless digital assault.
The KONNI Campaign Unveiled
According to The Register, the KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones belonging to South Korean targets. Researchers detailed how the hackers posed as counselors to North Korean defectors, using fake lures to infiltrate devices.
Genians’ analysis, as reported by Bleeping Computer, links this to the APT37 group, also known as KONNI. They exploited Google’s Find Hub to monitor locations and initiate wipes, ensuring no traces of their malware remain.
Hijacking Trusted Tools
The attack vector involves compromising Google accounts, often through phishing or malware delivered via trusted apps like KakaoTalk. CSO Online reports that the campaign hijacked accounts to abuse Android’s Find Hub, remotely wiping victims’ phones while spreading malware through contacts.
This misuse turns a safety feature against users. Google’s Find My Device allows remote locking, locating, and erasing of lost phones, but in hackers’ hands, it becomes a silent eraser of incriminating data.
Targeting Defectors and Beyond
Security Affairs highlights that North Korea-linked Konni APT posed as counselors to steal data and wipe Android phones via Google Find Hub in September 2025, specifically targeting defectors.
The operation’s focus on South Korean users underscores Pyongyang’s interest in monitoring and disrupting dissent. By wiping devices, hackers not only destroy evidence but also cause chaos, potentially erasing personal and professional data.
Technical Breakdown of the Exploit
Diving deeper, the hackers employ remote access trojans (RATs) and fake lures, as noted in The Hacker News. Konni and related groups like Lazarus use these to gain initial footholds, then leverage Google’s ecosystem for persistence.
Once inside, they access Find Hub to issue wipe commands. This requires no additional malware on the target device post-compromise, making detection harder. Genians researchers emphasized the novelty: it’s the first known abuse of this feature for such purposes.
Broader North Korean Cyber Tactics
North Korea’s cyber operations extend beyond this. Posts on X, formerly Twitter, discuss related threats, such as hackers using blockchain for malware distribution, as seen in alerts from cybersecurity accounts. For instance, recent X posts reference Google’s Mandiant uncovering North Korean spies infiltrating US companies as remote workers.
Historically, groups like KONNI have targeted military and nuclear secrets, per joint warnings from UK, US, and South Korea shared on X by Insider Paper. This Find Hub exploit fits into a pattern of innovative, low-cost attacks.
Google’s Response and Vulnerabilities
Google has not publicly detailed mitigations, but experts suggest enhanced account security like two-factor authentication could help. However, if accounts are fully compromised, such safeguards fail.
TechRadar describes Find Hub as an ‘unwitting ally’ in these attacks, highlighting how consumer tools become weapons in state-sponsored hands.
Implications for Cybersecurity
The incident raises alarms for industry insiders: how safe are cloud-based device management tools? Enterprises relying on Android ecosystems must reassess risks, especially in high-threat environments.
Analysts from Infosecurity Magazine note this as a new cyber-attack linked to North Korean APTs, exploiting Find Hub for remote wipes and causing disruption.
Global Ramifications and Defenses
Beyond South Korea, the tactic could target anyone with Android devices. Cybersecurity forums like MalwareTips discuss the campaign’s ingenuity, urging users to monitor account activity.
To counter, experts recommend regular security audits, app permission reviews, and awareness of phishing via messaging apps. As North Korea refines these methods, international cooperation becomes crucial.
Evolving Threat Landscape
Looking ahead, this exploit may inspire copycats. X posts from accounts like The Cyber Security Hub echo concerns, sharing news of the remote-wipe weaponization.
Industry leaders must innovate defenses, perhaps integrating AI-driven anomaly detection in device management services to flag suspicious remote commands.
Lessons from the Frontlines
Genians’ discovery, detailed across multiple outlets, serves as a wake-up call. By crediting sources like Bleeping Computer and The Register, we see a collaborative effort in exposing these threats.
Ultimately, this saga underscores the dual-use nature of technology: tools for good can be twisted for malice, demanding vigilance from users and providers alike.


WebProNews is an iEntry Publication