Back to Insights & News
November 13, 2025
5 min read
Marco Grima
Cybersecurity

North Korea Hijacks Google Find Hub to Wipe Android Devices

Nation state hackers breach Google's Find Hub service, weaponizing it to remotely wipe Android devices. Millions of users at risk in coordinated cyberattack.

North Korea Hijacks Google Find Hub to Wipe Android Devices
Share this article:

North Korean hackers just weaponized one of Google's most trusted services. They've infiltrated Google's Find Hub—the service that helps millions locate lost Android phones—and are using it as a weapon to remotely wipe devices of targeted users. This isn't a ransomware note or a extortion demand. This is nation state actors turning your smartphone's safety feature into an attack vector.

The implications are staggering. Find Hub exists on virtually every Android phone globally. Billions of devices. And now, at least some portion of that infrastructure has been compromised by a state-sponsored threat actor with one goal: selective, targeted device destruction.

The Attack Vector Nobody Saw Coming

State-sponsored cyberattack operations center

State-sponsored cyberattack operations center

Find Hub isn't some obscure Google service buried in Android settings. It's the feature people rely on when their phone goes missing. You log into find.google.com, and Google shows you exactly where your device is on a map. North Korean operators identified this trust relationship and exploited it ruthlessly.

They didn't need to breach every Android phone individually. They compromised the infrastructure that Android phones trust implicitly. Technical details of the exact exploitation method are not yet disclosed, but the result is clear: attackers gained the ability to send device wipe commands through legitimate Find Hub infrastructure, making the malicious actions appear legitimate to the target devices.

This is far more sophisticated than typical mobile malware. It's not about stealing data or displaying ads. It's about destroying evidence and disrupting operations. The target profiles suggest this is espionage-adjacent—removing tracks, eliminating communication records, and silencing witnesses.

Who's Being Hit and Why It Matters

Google hasn't publicly disclosed the exact number of devices affected or targeted users, but security researchers indicate this appears to be a precision strike operation. Not a spray-and-pray attack that hits everyone. North Korean actors specifically targeted devices belonging to individuals they wanted to silence.

This fundamentally changes the threat model for billions of Android users. Your phone isn't just vulnerable to traditional malware anymore. It's vulnerable to weaponized infrastructure trusted by your operating system. The Find Hub service was supposed to protect you. Instead, nation state actors turned it into a deletion tool.

The timing also matters. Nation states don't waste resources on infrastructure-level attacks without a strategic goal. Whether it's disrupting defectors, eliminating evidence before international investigations, or targeting activists and journalists, this attack signals North Korea's cyber capabilities have reached a new threshold.

What Happens When Google's Own Tools Become Weapons

Google's immediate response hasn't been fully detailed in available reports, but the situation is dire. Data about the incident scope is not yet available, making it impossible to determine exactly how many users were affected or how long the compromise persisted.

What we know: Google likely revoked compromised credentials, patched the vulnerability, and is now investigating how attackers obtained initial access. But here's the uncomfortable truth—if nation state actors got this deep into Find Hub infrastructure, they were likely there for weeks or months before detection. How many devices were wiped? How many people lost their phones at the exact moment they needed them most?

For enterprise users, this is a nightmare scenario. Companies deploy Find Hub for fleet management of corporate Android devices. If attackers can selectively wipe devices remotely, they can destroy sensitive business data, eliminate communication logs, and cripple operations simultaneously across an organization.

The Domino Effect Nobody's Talking About

This attack doesn't just affect Android users directly targeted. It damages the entire foundation of trust in mobile security infrastructure. Users now have to ask: if Find Hub was compromised, what other Google services might be? If your phone's location service is weaponized, what's next?

Android users with sensitive work will likely disable Find Hub, which defeats the purpose of having the service. Organizations will implement workarounds and third-party solutions. The attack doesn't need to hit millions of devices to cause massive disruption—it just needs to prove the vulnerability exists.

Security implications ripple across the ecosystem. If North Korea found a way into Find Hub's trusted infrastructure, other nation states were probably investigating the same vector. Apple users shouldn't feel safe either—Find My could theoretically face similar exploitation if equivalent vulnerabilities exist in Apple's code.

Bottom line:

When nation state actors turn your phone's safety feature into a weapon, it's not a software update anymore—it's a full recalibration of what "secure" actually means. Google will patch the vulnerability. Samsung and other OEMs will push updates. But the psychological damage is done. Billions of users just learned their devices aren't just vulnerable to hackers—they're vulnerable to governments. The Find Hub attack proves nation states see mobile infrastructure as a legitimate battlefield, and Google's billions in security spending clearly wasn't enough to stop them.


AI Generated Image | AI Generated Image

Need IT Support?

Ready to implement these solutions for your Malta business? Our experts are here to help.