Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes

Posted on January 9, 2026January 9, 2026 By CWS

The North Korean APT Kimsuky has been concentrating on authorities entities, tutorial establishments, and suppose tanks with spear-phishing emails containing malicious QR codes, the FBI warns.

Known as quishing, one of these assault includes phishing emails containing QR codes with embedded malicious URLs that drive the victims to make use of a cellular system as an alternative of their company pc.

The phishing approach leads to the bypass of conventional e-mail safety controls, the FBI notes in a contemporary alert (PDF).

“Quishing campaigns generally ship QR photographs as e-mail attachments or embedded graphics, evading URL inspection, rewriting, and sandboxing,” the FBI says.

As soon as the sufferer scans the malicious QR code, they’re redirected by means of attacker-controlled domains designed to gather system info resembling user-agent, OS, display screen dimension, IP tackle, and locale.

This info permits the attackers to serve their victims mobile-optimized phishing pages mimicking authentic Microsoft 365, Okta, or VPN portals, the FBI notes.Commercial. Scroll to proceed studying.

By stealing session cookies and mounting replay assaults, the hackers bypass multi-factor authentication (MFA) and hijack their sufferer’s cloud identities, the Bureau says.

After the preliminary intrusion, the attackers set up persistence and abuse the compromised identification to propagate secondary spear-phishing assaults.

“As a result of the compromise path originates on unmanaged cellular gadgets exterior regular Endpoint Detection and Response (EDR) and community inspection boundaries, Quishing is now thought of a high-confidence, MFA-resilient identification intrusion vector in enterprise environments,” the FBI’s alert reads.

In Could and June 2025, Kimsuky was seen using quishing in 4 assaults concentrating on suppose tanks and a strategic advisory agency.

The e-mail messages spoofed a international advisor, an embassy worker, and a suppose tank worker, and invited the staff of the advisory agency to a non-existent convention.

Lively since a minimum of 2012, Kimsuky is a state-sponsored espionage group centered on intelligence assortment from entities within the US, Japan, and South Korea.

Often known as APT43, Velvet Chollima, Emerald Sleet, TA406, and Black Banshee, the APT was sanctioned by the US in 2023, for actions facilitating sanction evasion and supporting Pyongyang’s weapons of mass destruction packages.

Associated: North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Pretend IT Staff

Associated: React2Shell Assaults Linked to North Korean Hackers

Associated: Chief of North Korean Hackers Sanctioned by EU

Associated: North Korean Hackers Distributed Android Adware through Google Play

Security Week News Tags:Attacks, Codes, FBI, Korean, Malicious, North, SpearPhishing

Post navigation

Previous Post: Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack
Next Post: Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Related Posts

Landfall Android Spyware Targeted Samsung Phones via Zero-Day Security Week News
Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday Security Week News
Russian Government Hackers Caught Buying Passwords from Cybercriminals Security Week News
European Space Agency Confirms Breach After Hacker Offers to Sell Data Security Week News
GeoServer Flaw Exploited in US Federal Agency Hack Security Week News
Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark