{"id":6788,"date":"2026-01-26T09:12:20","date_gmt":"2026-01-26T09:12:20","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/26\/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers\/"},"modified":"2026-01-26T09:12:20","modified_gmt":"2026-01-26T09:12:20","slug":"konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/26\/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers\/","title":{"rendered":"Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers"},"content":{"rendered":"<p>\u200bThe North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector.<br \/>\nThe phishing campaign has targeted Japan, Australia, and India, highlighting the adversary&#8217;s expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check\u00a0The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector.<br \/>\nThe phishing campaign has targeted Japan, Australia, and India, highlighting the adversary&#8217;s expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary&#8217;s expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations,&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/26\/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6789,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6788"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6788"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6788\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6789"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}