By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
Computing

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

News Room
Last updated: 2025/12/18 at 4:02 AM
News Room Published 18 December 2025
Share
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
SHARE

Dec 18, 2025Ravie LakshmananMalware / Mobile Security

The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics (formerly CJ Korea Express).

“The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile devices,” ENKI said. “The malicious app decrypts an embedded encrypted APK and launches a malicious service that provides RAT capabilities.”

“Since Android blocks apps from unknown sources and displays security warnings by default, the threat actor claims the app is a safe, official release to trick victims into ignoring the warning and installing the malware.”

Cybersecurity

According to the South Korean cybersecurity company, some of these artifacts masquerade as package delivery service apps. It’s being assessed that the threat actors are using smishing texts or phishing emails impersonating delivery companies to deceive recipients into clicking on booby-trapped URLs hosting the apps.

A noteworthy aspect of the attack is its QR code-based mobile redirection, which prompts users visiting the URLs from a desktop computer to scan a QR code displayed on the page on their Android device to install the supposed shipment tracking app and look up the status.

Present within the page is a tracking PHP script that checks the User-Agent string of the browser and then displays a message urging them to install a security module under the guise of verifying their identity due to supposed “international customs security policies.”

Should the victim proceed to install the app, an APK package (“SecDelivery.apk”) is downloaded from the server (“27.102.137[.]181”). The APK file then decrypts and loads an encrypted APK embedded into its resources to launch the new version of DocSwap, but not before ascertaining that it has obtained the necessary permission to read and manage external storage, access the internet, and install additional packages.

“Once it confirms all permissions, it immediately registers the MainService of the newly loaded APK as ‘com.delivery.security.MainService,'” ENKI said. “Simultaneously with service registration, the base application launches AuthActivity. This activity masquerades as an OTP authentication screen and verifies the user’s identity using a delivery number.”

The shipment number is hard-coded within the APK as “742938128549,” and is likely delivered alongside the malicious URL during the initial access phase. Once the user enters the provided delivery number, the application is configured to generate a random six-digit verification code and display it as a notification, following which they are prompted to input the generated code.

As soon as the code is provided, the app opens a WebView with the legitimate URL “www.cjlogistics[.]com/ko/tool/parcel/tracking,” while, in the background, the trojan connects to an attacker-controlled server (“27.102.137[.]181:50005”) and receive as many as 57 commands that allow it to log keystrokes, capture audio, start/stop camera recording perform file operations, run commands, upload/download files, and gather location, SMS messages, contacts, call logs, and a list of installed apps.

ENKI said it also discovered two other samples disguised as a P2B Airdrop app and a trojanized version of a legitimate VPN program called BYCOM VPN (“com.bycomsolutions.bycomvpn”) that’s available on the Google Play Store and developed by an Indian IT services company named Bycom Solutions.

Cybersecurity

“This indicates that the threat actor injected malicious functionality into the legitimate APK and repackaged it for use in the attack,” the security company added.

Further analysis of the threat actor infrastructure has uncovered phishing sites mimicking South Korean platforms like Naver and Kakao that seek to capture users’ credentials. These sites, in turn, have been found to share overlaps with a prior Kimsuky credential harvesting campaign targeting Naver users.

“The executed malware launches a RAT service, capabilities, similarly to past cases but demonstrates evolved such as using a new native function to decrypt the internal APK and incorporating diverse decoy behaviors,” ENKI said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Parents of sextortion victim sue Meta for alleged wrongful death Parents of sextortion victim sue Meta for alleged wrongful death
Next Article Nvidia Might Cut RTX 50 GPU Supply by Up to 40% in 2026 Due to Memory Shortages Nvidia Might Cut RTX 50 GPU Supply by Up to 40% in 2026 Due to Memory Shortages
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Instagram wants to limit hashtag spam
Instagram wants to limit hashtag spam
News
RentSpree, a profitable real estate startup helping mom-and-pop landlords, bets big on Seattle
RentSpree, a profitable real estate startup helping mom-and-pop landlords, bets big on Seattle
Computing
You Should Be Taking Advantage of Verizon's Streaming Perks for Netflix, HBO Max and More
You Should Be Taking Advantage of Verizon's Streaming Perks for Netflix, HBO Max and More
News
Displace Hub will turn your television wireless and keep your wall blemish-free
Displace Hub will turn your television wireless and keep your wall blemish-free
Gadget

You Might also Like

RentSpree, a profitable real estate startup helping mom-and-pop landlords, bets big on Seattle
Computing

RentSpree, a profitable real estate startup helping mom-and-pop landlords, bets big on Seattle

3 Min Read
Newer RISC-V CPUs Vulnerable To Spectre V1 – Linux Mitigation Patches Posted
Computing

Newer RISC-V CPUs Vulnerable To Spectre V1 – Linux Mitigation Patches Posted

2 Min Read
Lilith Games’ AFK Journey and miHoYo’s Zenless Zone Zero nominated for iPhone Game of the Year 2024 · TechNode
Computing

Lilith Games’ AFK Journey and miHoYo’s Zenless Zone Zero nominated for iPhone Game of the Year 2024 · TechNode

1 Min Read
The Ultimate Guide to Social Listening: What You Need To Know
Computing

The Ultimate Guide to Social Listening: What You Need To Know

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?