North Korea’s Cyber Shadows: Hijacking Google’s Find Hub for Stealth Wipes

North Korean hackers from the KONNI group have weaponized Google's Find My Device feature to remotely wipe Android phones, targeting South Korean defectors by hijacking accounts and spreading malware via KakaoTalk. This sophisticated cyber espionage blends surveillance with data destruction, highlighting vulnerabilities in consumer tech tools.
North Korea’s Cyber Shadows: Hijacking Google’s Find Hub for Stealth Wipes
Written by John Marshall

In a chilling escalation of cyber espionage, North Korean hackers have transformed Google’s innocuous Find My Device feature into a potent tool for remote data destruction. Dubbed ‘Find Hub’ in some reports, this service—intended to help users locate lost Android phones—has been weaponized by the state-backed KONNI group to erase evidence and disrupt targets, primarily in South Korea.

The campaign, uncovered by South Korean cybersecurity firm Genians, reveals a sophisticated operation where attackers hijack victims’ Google accounts to trigger factory resets on Android devices. This not only wipes data but also tracks GPS locations, blending surveillance with sabotage in a seamless digital assault.

The KONNI Campaign Unveiled

According to The Register, the KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones belonging to South Korean targets. Researchers detailed how the hackers posed as counselors to North Korean defectors, using fake lures to infiltrate devices.

Genians’ analysis, as reported by Bleeping Computer, links this to the APT37 group, also known as KONNI. They exploited Google’s Find Hub to monitor locations and initiate wipes, ensuring no traces of their malware remain.

Hijacking Trusted Tools

The attack vector involves compromising Google accounts, often through phishing or malware delivered via trusted apps like KakaoTalk. CSO Online reports that the campaign hijacked accounts to abuse Android’s Find Hub, remotely wiping victims’ phones while spreading malware through contacts.

This misuse turns a safety feature against users. Google’s Find My Device allows remote locking, locating, and erasing of lost phones, but in hackers’ hands, it becomes a silent eraser of incriminating data.

Targeting Defectors and Beyond

Security Affairs highlights that North Korea-linked Konni APT posed as counselors to steal data and wipe Android phones via Google Find Hub in September 2025, specifically targeting defectors.

The operation’s focus on South Korean users underscores Pyongyang’s interest in monitoring and disrupting dissent. By wiping devices, hackers not only destroy evidence but also cause chaos, potentially erasing personal and professional data.

Technical Breakdown of the Exploit

Diving deeper, the hackers employ remote access trojans (RATs) and fake lures, as noted in The Hacker News. Konni and related groups like Lazarus use these to gain initial footholds, then leverage Google’s ecosystem for persistence.

Once inside, they access Find Hub to issue wipe commands. This requires no additional malware on the target device post-compromise, making detection harder. Genians researchers emphasized the novelty: it’s the first known abuse of this feature for such purposes.

Broader North Korean Cyber Tactics

North Korea’s cyber operations extend beyond this. Posts on X, formerly Twitter, discuss related threats, such as hackers using blockchain for malware distribution, as seen in alerts from cybersecurity accounts. For instance, recent X posts reference Google’s Mandiant uncovering North Korean spies infiltrating US companies as remote workers.

Historically, groups like KONNI have targeted military and nuclear secrets, per joint warnings from UK, US, and South Korea shared on X by Insider Paper. This Find Hub exploit fits into a pattern of innovative, low-cost attacks.

Google’s Response and Vulnerabilities

Google has not publicly detailed mitigations, but experts suggest enhanced account security like two-factor authentication could help. However, if accounts are fully compromised, such safeguards fail.

TechRadar describes Find Hub as an ‘unwitting ally’ in these attacks, highlighting how consumer tools become weapons in state-sponsored hands.

Implications for Cybersecurity

The incident raises alarms for industry insiders: how safe are cloud-based device management tools? Enterprises relying on Android ecosystems must reassess risks, especially in high-threat environments.

Analysts from Infosecurity Magazine note this as a new cyber-attack linked to North Korean APTs, exploiting Find Hub for remote wipes and causing disruption.

Global Ramifications and Defenses

Beyond South Korea, the tactic could target anyone with Android devices. Cybersecurity forums like MalwareTips discuss the campaign’s ingenuity, urging users to monitor account activity.

To counter, experts recommend regular security audits, app permission reviews, and awareness of phishing via messaging apps. As North Korea refines these methods, international cooperation becomes crucial.

Evolving Threat Landscape

Looking ahead, this exploit may inspire copycats. X posts from accounts like The Cyber Security Hub echo concerns, sharing news of the remote-wipe weaponization.

Industry leaders must innovate defenses, perhaps integrating AI-driven anomaly detection in device management services to flag suspicious remote commands.

Lessons from the Frontlines

Genians’ discovery, detailed across multiple outlets, serves as a wake-up call. By crediting sources like Bleeping Computer and The Register, we see a collaborative effort in exposing these threats.

Ultimately, this saga underscores the dual-use nature of technology: tools for good can be twisted for malice, demanding vigilance from users and providers alike.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us