Original Article Text

Click to Toggle View

FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs. The North Korean state-sponsored hacker group Kimsuki is using malicious QR codes in spearphishing campaigns that target U.S. organizations, the Federal Bureau of Investigation warns in a flash alert. The observed activity targets organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S. The use of QR codes in phishing, a technique also known as "quishing," isn’t new; the FBI warned about it when cybercriminals used it to steal money, but it remains an effective security bypass. Kimsuky (APT43) is a state-backed North Korean threat group that has been linked to multiple attacks where hackers posed as journalists, exploited known vulnerabilities, relied on supply-chain attacks, and ClickFix tactics. The FBI warns that in campaigns last year, Kimsuki-associated actors sent emails containing QR codes that redirected victims to malicious locations disguised as questionnaires, secure drives, or fake login pages. The agency provided a set of four examples where Kimsuki relied on quishing to redirect targets to an attacker-controlled location. To trick the victim, the attackers pretended to be foreign investors, embassy employees, think tank members, and conference organizers. "In June 2025, Kimsuky actors sent a strategic advisory firm a spearphishing email inviting recipients to a non-existent conference," the FBI says. The quishing technique In a quishing campaign, victims scanning the QR code are typically routed through attacker-controlled infrastructure that fingerprints their devices, collects user agent details, operating system, IP address, screen size, and local language. Usually, victims are served a phishing page that impersonates Microsoft 365, Okta, VPN portals, or Google login pages, the ultimate goal being to steal access credentials or tokens. "Quishing operations frequently end with session token theft and replay, enabling attackers to bypass multi-factor authentication and hijack cloud identities without triggering the typical 'MFA failed' alerts," the agency notes. Because it forces the target to use their mobile devices to scan the QR code, threat actors manage to avoid traditional email security solutions and can distribute malicious emails from a compromised inbox. The FBI describes these attacks as an "MFA-resilient identity intrusion vector" because they originate from unmanaged mobile devices outside standard Endpoint Detection and Response (EDR) and network monitoring. To defend against these attacks, the FBI recommends targeted employee training, QR code source verification, implementation of mobile device management, and multi-factor authentication enforcement. The agency recommends that targets of such attacks should report them immediately to their local FBI Cyber Squad or the IC3 portal. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.

Daily Brief Summary

NATION STATE ACTIVITY // FBI Warns of Kimsuky Phishing via Malicious QR Codes in U.S.

The FBI has issued a flash alert about Kimsuky, a North Korean state-sponsored group, using QR codes in spearphishing campaigns targeting U.S. organizations.

Targets include entities involved in North Korea-related policy, such as NGOs, think tanks, academic institutions, strategic advisory firms, and government bodies.

Kimsuky employs "quishing," where QR codes redirect victims to malicious sites disguised as questionnaires or login pages to steal credentials.

The technique bypasses traditional email defenses by exploiting mobile devices, enabling attackers to collect device fingerprints and user details.

These campaigns often impersonate Microsoft 365, Okta, or Google login pages to capture access credentials or session tokens.

The FBI advises implementing employee training, verifying QR code sources, and enforcing mobile device management and multi-factor authentication.

Organizations are urged to report incidents to their local FBI Cyber Squad or through the IC3 portal for further investigation.