Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App

Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App

Posted on December 17, 2025December 17, 2025 By CWS

The North Korean state-linked risk group Kimsuky has expanded its assault strategies by distributing a harmful cellular malware by weaponized QR codes, concentrating on customers by refined phishing websites that imitate bundle supply providers.

Safety researchers found the malicious marketing campaign in September 2025, when victims acquired smishing messages with hyperlinks that redirected them to faux supply monitoring web sites internet hosting QR codes designed to trick customers into downloading contaminated Android purposes on their smartphones.

QR-based cellular redirection (Supply – Enki)

The malware represents the newest model of “DOCSWAP,” a risk first documented earlier in 2025.

This new variant reveals a number of enhancements over earlier variations, together with a brand new native decryption perform and extra assorted decoy behaviors.

Assault Move (Supply – Enki)

Enki analysts recognized the malicious utility being distributed from a command and management server situated at 27.102.137[.]181, the place it impersonated respectable providers like CJ Logistics, public sale platforms, VPN apps, and cryptocurrency airdrop authentication techniques to deceive victims.

When customers entry the phishing hyperlinks from a pc, they see a message stating “For safety causes, you can not view this web page from a PC” together with a QR code.

Scanning this code with a cellular gadget initiates the obtain of what seems to be a safety app. Nonetheless, accessing the identical hyperlink from an Android gadget straight shows faux safety scanning screens and prompts customers to put in a “safety app” to finish authentication.

The malicious utility makes use of Base64-encoded URLs and server-side logic that serves completely different content material based mostly on the consumer’s gadget kind, making detection tougher.

As soon as put in, the malware operates in a number of phases. The applying first requests in depth permissions together with file entry, cellphone, SMS, and placement knowledge.

The downloaded APK file, named “SecDelivery.apk,” incorporates an encrypted APK saved as “safety.dat” in its sources. Not like earlier variations that used Java-based XOR decryption, this variant employs a local library referred to as “libnative-lib.so” to decrypt the embedded APK.

The decryption course of includes three steps: inverting bits of every byte worth, making use of a 5-bit left rotation, and performing XOR operations with a 4-byte key (541161FE in hex).

An infection Mechanism and Persistence

The malware establishes persistence by a complicated service registration course of.

After decryption, the applying launches SplashActivity, which masses the encrypted sources, requests mandatory permissions, and registers a malicious service referred to as MainService.

To keep up steady operation, the malware configures intent filters that routinely execute MainService when the gadget reboots or connects to energy.

The AndroidManifest.xml file defines these triggers as “android.intent.motion.BOOT_COMPLETED,” “android.intent.motion.ACTION_POWER_CONNECTED,” and “android.intent.motion.ACTION_POWER_DISCONNECTED”.

The applying shows a convincing faux authentication display screen that asks customers to enter a supply monitoring quantity and verification code. The hardcoded supply quantity “742938128549” is included with the preliminary phishing message.

Pretend authentication display screen (Supply – Enki)

After authentication, the app reveals the official supply monitoring web site by a webview, making customers imagine they’ve put in a respectable utility whereas the malicious service operates silently within the background.

The embedded RAT helps 57 instructions that allow complete gadget management. It communicates with the command and management server utilizing a format that features size headers, null bytes, and Gzip-compressed payloads.

The command parsing logic makes use of “10249” as a delimiter, permitting the malware to carry out actions equivalent to audio and video recording, file administration, location monitoring, name log assortment, contact record theft, SMS interception, distant command execution, and dwell keylogging.

The keylogger operates by Android’s Accessibility Service, capturing app icons, bundle names, occasion textual content, and timestamps, that are then compressed and Base64-encoded earlier than transmission.

// Korean remark: “Go away log when button is clicked”
btn.addEventListener(“click on”, () => {
fetch(“downcat.php”, {
methodology: “POST”,
headers: { “Content material-Kind”: “utility/json” },
physique: JSON.stringify({
time: new Date().toISOString(),
url: decodedUrl
})
}).catch(err => console.error(“Log transmission failed:”, err));
});

Researchers found connections between this marketing campaign and former Kimsuky operations by shared infrastructure, together with the distinctive “Million OK !!!!” string discovered on the basis listing of command and management servers.

Korean-language feedback all through the HTML code and error messages present extra proof linking the exercise to North Korean risk actors.

The marketing campaign demonstrates Kimsuky’s continued evolution in cellular threats, concentrating on smartphones that include delicate monetary and private info.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:App, Attacking, Code, Deliver, Hackers, Kimsuky, Malicious, Mobile, Users, Weaponized

Post navigation

Previous Post: Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign
Next Post: Microsoft 365 Services and Copilot Outage Hits Users in Japan and China

Related Posts

Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads Cyber Security News
New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats Cyber Security News
Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Cyber Security News
Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location Cyber Security News
Splunk Address Third-Party Packages Vulnerabilities in SOAR Versions Splunk Address Third-Party Packages Vulnerabilities in SOAR Versions Cyber Security News
OpenAI Set to Acquire Analytics Platform Statsig in .1 Billion Agreement OpenAI Set to Acquire Analytics Platform Statsig in $1.1 Billion Agreement Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News