Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI-Forged Military IDs Used in North Korean Phishing Attack
News

AI-Forged Military IDs Used in North Korean Phishing Attack

Team-CWDBy Team-CWDSeptember 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A North Korean threat actor has leveraged AI to create fake South Korean military agency ID card images used in a spear-phishing campaign, according to cybersecurity firm Genians.

The Kimsuky state-affiliated group was observed using ChatGPT to produce the sample ID card images to help lure the victims into clicking a malicious link. The attackers impersonated a South Korean defense-related institution, claiming to handle ID issuance tasks for military-affiliated officials.

The AI-generated ID cards were designed to enhance the authenticity of the phishing email.

“This is a real case demonstrating the Kimsuky group’s application of deepfake technology,” the Genian researchers wrote in the report, dated September 15.

The attack was first detected by the Genians Security Center (GSC) on July 17. The campaign followed of a series of ClickFix-based phishing campaigns attributed to Kimsuky in June.

Both attack campaigns deployed the same malware which is designed to enable malicious activities such as internal data theft and remote control.

The primary targets of the campaigns were researchers in North Korean studies, North Korean human rights activists and journalists, the researchers noted.

AI-Developed Military ID

The use of AI-generated images marked an evolution of the Kimsuky ClickFix attacks observed by the researchers.

The sender’s email address closely mimicked the official domain of a South Korean military institution and purported to be a draft review request for military employee ID cards.

The email contained fake images of South Korea military employee ID cards as samples, attached as PNG files.

The files were identified as a deepfake image with a 98% probability.

A separate file, ‘LhUdPC3G.bat,’ installed along with the image, was executed and initiated malicious activity once downloaded.

Prompt Injection Used to Generate Illegal Images

The report noted that it is illegal to produce copies of military government IDs. Therefore, when prompted to generate such an ID copy, ChatGPT returns a refusal.

However, prompt injection can be used to overcome this refusal. For example, the researchers said the large language model (LLM) may respond to requests framed as creating a mock-up or sample design for legitimate purposes rather than reproducing an actual military ID.

“The deepfake image used in this attack fell into this category. Because creating counterfeit IDs with AI services is technically straightforward, extra caution is required,” they wrote.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNoisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test
Next Article Why you should never pay to get paid
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.