By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Computing

FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing

News Room
Last updated: 2026/01/09 at 8:41 PM
News Room Published 9 January 2026
Share
FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
SHARE

Jan 09, 2026Ravie LakshmananMobile Security / Email Security

The U.S. Federal Bureau of Investigation (FBI) on Thursday released an advisory warning of North Korean state-sponsored threat actors leveraging malicious QR codes in spear-phishing campaigns targeting entities in the country.

“As of 2025, Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR) codes in spear-phishing campaigns,” the FBI said in the flash alert. “This type of spear-phishing attack is referred to as quishing.”

The use of QR codes for phishing is a tactic that forces victims to shift from a machine that’s secured by enterprise policies to a mobile device that may not offer the same level of protection, effectively allowing threat actors to bypass traditional defenses.

Cybersecurity

Kimsuky, also tracked as APT43, Black Banshee, Emerald Sleet, Springtail, TA427, and Velvet Chollima, is a threat group that’s assessed to be affiliated with North Korea’s Reconnaissance General Bureau (RGB). It has a long history of orchestrating spear-phishing campaigns that are specifically designed to subvert email authentication protocols.

In a bulletin released in May 2024, the U.S. government called out the hacking crew for exploiting improperly configured Domain-based Message Authentication, Reporting, and Conformance (DMARC) record policies to send emails that look like they’ve come from a legitimate domain.

The FBI said it observed the Kimsuky actors utilizing malicious QR codes as part of targeted phishing efforts several times in May and June 2025 –

  • Spoofing a foreign advisor in emails requesting insight from a think tank leader regarding recent developments on the Korean Peninsula by scanning a QR code to access a questionnaire
  • Spoofing an embassy employee in emails requesting input from a senior fellow at a think tank about North Korean human rights issues, along with a QR code that claimed to provide access to a secure drive
  • Spoofing a think tank employee in emails with a QR code that’s designed to take the victim to infrastructure under their control for follow-on activity
  • Sending emails to a strategic advisory firm, inviting them to a non-existent conference by urging the recipients to scan a QR code to redirect them to a registration landing page that’s designed to harvest their Google account credentials by using a fake login page
Cybersecurity

The disclosure comes less than a month after ENKI revealed details of a QR code campaign conducted by Kimsuky to distribute a new variant of Android malware called DocSwap in phishing emails mimicking a Seoul-based logistics firm.

“Quishing operations frequently end with session token theft and replay, enabling attackers to bypass multi-factor authentication and hijack cloud identities without triggering typical ‘MFA failed’ alerts,” the FBI said. “Adversaries then establish persistence in the organization and propagate secondary spear-phishing from the compromised mailbox.”

“Because the compromise path originates on unmanaged mobile devices outside normal Endpoint Detection and Response (EDR) and network inspection boundaries, Quishing is now considered a high-confidence, MFA-resilient identity intrusion vector in enterprise environments.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article This  scanner app lasts for life This $28 scanner app lasts for life
Next Article Did Samsung accidentally leak the iPhone Fold’s display? Did Samsung accidentally leak the iPhone Fold’s display?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Qualcomm Sends Out Linux Patches For RAS Support On RISC-V For Reporting Hardware Errors
Qualcomm Sends Out Linux Patches For RAS Support On RISC-V For Reporting Hardware Errors
Computing
MPs and contractors urge UK government to U-turn on ‘manifestly unfair’ Loan Charge settlement terms | Computer Weekly
MPs and contractors urge UK government to U-turn on ‘manifestly unfair’ Loan Charge settlement terms | Computer Weekly
News
Urgent warning as Instagram users targeted by surge in ‘password reset’ attacks
Urgent warning as Instagram users targeted by surge in ‘password reset’ attacks
News
CES 2026: This Motorized Dock Turns Your iPhone Into a Tracking AI Robot · TechNode
CES 2026: This Motorized Dock Turns Your iPhone Into a Tracking AI Robot · TechNode
Computing

You Might also Like

Qualcomm Sends Out Linux Patches For RAS Support On RISC-V For Reporting Hardware Errors
Computing

Qualcomm Sends Out Linux Patches For RAS Support On RISC-V For Reporting Hardware Errors

1 Min Read
CES 2026: This Motorized Dock Turns Your iPhone Into a Tracking AI Robot · TechNode
Computing

CES 2026: This Motorized Dock Turns Your iPhone Into a Tracking AI Robot · TechNode

1 Min Read
Using ChatGPT as a Reporting Assistant: What Went Wrong? | HackerNoon
Computing

Using ChatGPT as a Reporting Assistant: What Went Wrong? | HackerNoon

8 Min Read
Startup’s radar tech in a handheld scanner could change how police conduct weapons searches
Computing

Startup’s radar tech in a handheld scanner could change how police conduct weapons searches

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?