Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

US To Leave Global Forum on Cyber Expertise

January 9, 2026

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

January 9, 2026

AI-Powered Truman Show Operation Industrializes Investment Fraud

January 9, 2026
Facebook X (Twitter) Instagram
Saturday, January 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»FBI Warns of North Korean QR Phishing Campaigns
News

FBI Warns of North Korean QR Phishing Campaigns

Team-CWDBy Team-CWDJanuary 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


US law enforcers have issued a new alert to domestic and foreign organizations about ongoing North Korean phishing campaigns that use QR codes to bypass email security.

The FBI Flash report issued yesterday claimed that Pyongyang’s prolific Kimsuky APT group targeted think tanks, academic institutions and US and foreign “government entities” with the tactic in 2025.

This included:

  • A May 2025 email sent to a think tank leader from Kimsuky actors spoofing a “foreign advisor.” It requested insight on developments on the Korean peninsula and featured a QR code to scan in order to access a ‘questionnaire’
  • A May 2025 phishing email sent to a senior fellow at a think tank. Spoofed to appear as if sent from an embassy employee, it apparently asked for input into North Korean human rights issues and contained a QR code claiming to provide access to a secure drive
  • A May 2025 spear phishing email spoofing a think tank employee that featured a QR code designed to take the victim to “Kimsuky infrastructure”
  • A June 2025 spear phishing email sent to a “strategic advisory firm” inviting recipients to a non-existent conference. It featured a QR code claiming to take them to a registration landing page, but actually directed victims to a fake Google login page designed to harvest credentials

Read more on quishing: Hackers Weaponize QR Codes in New ‘Quishing’ Attacks

The idea behind QR code-based phishing (quishing) is to redirect victims to their mobile device, which may not be as well protected with anti-malware capabilities as their desktop/email security setup.

“Quishing campaigns commonly deliver QR images as email attachments or embedded graphics, evading URL inspection, rewriting, and sandboxing,” the FBI alert noted.

“After scanning, victims are routed through attacker-controlled redirectors that collect device and identity attributes such as user-agent, OS, IP address, locale, and screen size in order to selectively present mobile-optimized credential harvesting pages impersonating Microsoft 365, Okta, or VPN portals.”

It’s not just about stealing credentials. The FBI warned that quishing attacks often end with session token theft and replay, in order to help threat actors bypass multi-factor authentication (MFA) and hijack cloud identities without setting off any alarms.

“Adversaries then establish persistence in the organization and propagate secondary spearphishing from the compromised mailbox,” the FBI continued.

“Because the compromise path originates on unmanaged mobile devices outside normal endpoint detection and response (EDR) and network inspection boundaries, quishing is now considered a high-confidence, MFA-resilient identity intrusion vector in enterprise environments.”

Taking Action to Block Quishing Attacks

Quishing is just one of many tools in the arsenal for North Korean threat actors, who are typically tasked with both cyber-espionage and extracting wealth from crypto firms. In fact, a Chainalysis report from December claimed the hermit nation stole over $2bn in crypto last year.

The FBI recommended at-risk organizations adopt a multi-layered response to the threat of quishing. This includes:

  • Updated employee education and awareness training
  • Urging staff to verify QR code sources through secondary means (e.g., by contacting the sender directly), especially before entering logins or downloading files
  • Establishing protocols for reporting malicious or suspicious QR codes
  • Deploying mobile device management (MDM) or endpoint security to scan QR codes before allowing access to linked resources
  • Demanding phishing-resistant MFA for all remote access and sensitive systems
  • Logging/monitoring all credential entry and network activity following QR code scans
  • Enforcing strong, unique password policies across all services
  • Regularly auditing account permissions and access privileges, and enforcing least privilege policies
  • Regularly updating anti-malware tools and patching known vulnerabilities on devices



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRussia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
Next Article Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers
Team-CWD
  • Website

Related Posts

News

US To Leave Global Forum on Cyber Expertise

January 9, 2026
News

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

January 9, 2026
News

AI-Powered Truman Show Operation Industrializes Investment Fraud

January 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.