North Korean state-backed spies have found a new way to torch evidence of their own cyber-spying – by hijacking Google's "Find Hub" service to remotely wipe Android phones belonging to their South Korean targets.
Researchers at South Korean cybersecurity firm Genians said the campaign, attributed to the long-running KONNI group, abused Google's device management features to trigger factory resets on compromised smartphones and tablets. In several cases, victims' devices were wiped without authorization, erasing messages, photos, and other data that could have revealed traces of the intrusion.
"The recently identified KONNI campaign is particularly notable for cases in which Google Android–based smartphones and tablet PCs in South Korea were remotely reset, resulting in the unauthorized deletion of personal data stored on the devices," Genians wrote in its analysis.
The KONNI group, linked for years to North Korea's intelligence apparatus, has a history of espionage operations aimed at Seoul's government, military, and think tank sectors. Its latest campaign marks an escalation in its mobile-focused tactics, showing that Pyongyang's cyber operators are increasingly adept at exploiting legitimate cloud services to hide their activity and control victims' devices.
According to Genians, the attackers used stolen Google account credentials harvested through spear-phishing or fake login pages to access victims' profiles on the Find My Device platform. The feature, which allows users to locate lost phones, lock them, or perform a factory reset, became an unwitting tool for sabotage. Once logged in, the hackers could trigger remote wipes, locking victims out of their own phones and destroying incriminating evidence of compromise.
North Korean spies used Google Find Hub as remote-wipe tool
: KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones
