Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google warns of active exploitation of WinRAR vulnerability CVE-2025-8088

UK hydrogen industry poised for expansion, but policy slows momentum

Road pavement evaluation using low-cost AI technology

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » FBI warns North Korean hackers are using malicious QR codes in spear phishing
Identity

FBI warns North Korean hackers are using malicious QR codes in spear phishing

userBy userJanuary 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 9, 2026Ravi LakshmananMobile Security / Email Security

The US Federal Bureau of Investigation (FBI) on Thursday issued an advisory warning that North Korean state-sponsored attackers are using malicious QR codes in spear-phishing campaigns targeting organizations in the country.

“As of 2025, Kimsuky threat actors have embedded malicious Quick Response (QR) codes in spear-phishing campaigns targeting think tanks, academic institutions, and U.S. and foreign government agencies,” the FBI said in a bulletin. “This type of spear-phishing attack is called quissing.”

The use of QR codes in phishing is a tactic that forces victims to move from machines protected by corporate policies to mobile devices that may not offer the same level of protection, effectively allowing attackers to bypass traditional defenses.

cyber security

Kimsuky, also tracked as APT43, Black Banshee, Emerald Sleet, Springtail, TA427, and Velvet Chollima, is a threat group assessed to be affiliated with North Korea’s Reconnaissance General Bureau (RGB). It has a long history of organizing spear-phishing campaigns specifically aimed at subverting email authentication protocols.

In a bulletin published in May 2024, the U.S. government accused a hacking group of abusing improperly configured Domain-Based Message Authentication, Reporting, and Conformance (DMARC) record policies to send emails that appeared to come from legitimate domains.

The FBI announced that it observed Kimski attackers using malicious QR codes several times in May and June 2025 as part of targeted phishing operations.

Impersonates a foreign advisor in an email that scans a QR code to access a survey and asks for insight from a think tank leader on recent developments on the Korean peninsula Claims to provide access to a secure drive Impersonates an embassy official in an email asking for an opinion from a senior think tank researcher on human rights issues in North Korea, along with a QR code QR designed to direct victims to controlled infrastructure for further activities A strategic advisory firm impersonating a think tank official in an email containing a code invites recipients to scan a QR code to be redirected to a registration landing page designed to collect Google account credentials using a fake login page, inviting them to a non-existent conference.

cyber security

The disclosure comes less than a month after ENKI revealed details of a QR code campaign run by Kimsuky to distribute a new variant of Android malware called DocSwap in phishing emails imitating a Seoul-based logistics company.

“Outage operations often end with the theft and reclamation of session tokens, allowing attackers to bypass multi-factor authentication and take over cloud identities without triggering the typical ‘MFA failed’ alert,” the FBI said. “The attacker then establishes persistence within the organization and spreads secondary spear phishing from the compromised mailbox.”[andpropagatesecondaryspear-phishingfromthecompromisedmailbox”[andpropagatesecondaryspear-phishingfromthecompromisedmailbox”

“Quishing is now considered a reliable, MFA-resistant identity intrusion vector in enterprise environments, as the compromise path originates from unmanaged mobile devices outside of normal endpoint detection and response (EDR) and network inspection perimeters.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGovernment grapples with flood of non-consensual nudity in X
Next Article History of Science: Sophie Germain, the first woman to win France’s prestigious Grand Prize in Mathematics, is ignored because her ticket to the ceremony was “lost in the mail” — January 9, 1816
user
  • Website

Related Posts

Google warns of active exploitation of WinRAR vulnerability CVE-2025-8088

January 28, 2026

Unmasking new TOAD attacks hidden in legitimate infrastructure

January 28, 2026

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google warns of active exploitation of WinRAR vulnerability CVE-2025-8088

UK hydrogen industry poised for expansion, but policy slows momentum

Road pavement evaluation using low-cost AI technology

Exploring the closed nuclear fuel cycle: From recycling to fuel

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.