Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes

FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes

Posted on January 9, 2026January 9, 2026 By CWS

The North Korean APT Kimsuky has been concentrating on authorities entities, tutorial establishments, and suppose tanks with spear-phishing emails containing malicious QR codes, the FBI warns.

Known as quishing, one of these assault includes phishing emails containing QR codes with embedded malicious URLs that drive the victims to make use of a cellular system as an alternative of their company pc.

The phishing approach leads to the bypass of conventional e-mail safety controls, the FBI notes in a contemporary alert (PDF).

“Quishing campaigns generally ship QR photographs as e-mail attachments or embedded graphics, evading URL inspection, rewriting, and sandboxing,” the FBI says.

As soon as the sufferer scans the malicious QR code, they’re redirected by means of attacker-controlled domains designed to gather system info resembling user-agent, OS, display screen dimension, IP tackle, and locale.

This info permits the attackers to serve their victims mobile-optimized phishing pages mimicking authentic Microsoft 365, Okta, or VPN portals, the FBI notes.Commercial. Scroll to proceed studying.

By stealing session cookies and mounting replay assaults, the hackers bypass multi-factor authentication (MFA) and hijack their sufferer’s cloud identities, the Bureau says.

After the preliminary intrusion, the attackers set up persistence and abuse the compromised identification to propagate secondary spear-phishing assaults.

“As a result of the compromise path originates on unmanaged cellular gadgets exterior regular Endpoint Detection and Response (EDR) and community inspection boundaries, Quishing is now thought of a high-confidence, MFA-resilient identification intrusion vector in enterprise environments,” the FBI’s alert reads.

In Could and June 2025, Kimsuky was seen using quishing in 4 assaults concentrating on suppose tanks and a strategic advisory agency.

The e-mail messages spoofed a international advisor, an embassy worker, and a suppose tank worker, and invited the staff of the advisory agency to a non-existent convention.

Lively since a minimum of 2012, Kimsuky is a state-sponsored espionage group centered on intelligence assortment from entities within the US, Japan, and South Korea.

Often known as APT43, Velvet Chollima, Emerald Sleet, TA406, and Black Banshee, the APT was sanctioned by the US in 2023, for actions facilitating sanction evasion and supporting Pyongyang’s weapons of mass destruction packages.

Associated: North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Pretend IT Staff

Associated: React2Shell Assaults Linked to North Korean Hackers

Associated: Chief of North Korean Hackers Sanctioned by EU

Associated: North Korean Hackers Distributed Android Adware through Google Play

Security Week News Tags:Attacks, Codes, FBI, Korean, Malicious, North, SpearPhishing

Post navigation

Previous Post: Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack
Next Post: Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Related Posts

Compumedics Ransomware Attack Led to Data Breach Impacting 318,000 Compumedics Ransomware Attack Led to Data Breach Impacting 318,000 Security Week News
Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities Security Week News
eSIM Hack Allows for Cloning, Spying  eSIM Hack Allows for Cloning, Spying  Security Week News
Penn and Phoenix Universities Disclose Data Breach After Oracle Hack Penn and Phoenix Universities Disclose Data Breach After Oracle Hack Security Week News
Critical BeyondTrust Flaw Targeted in Ransomware Surge Critical BeyondTrust Flaw Targeted in Ransomware Surge Security Week News
TARmageddon Flaw in Popular Rust Library Leads to RCE TARmageddon Flaw in Popular Rust Library Leads to RCE Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark