top of page

North Korea-Linked Kimsuky APT Group Responsible for Phishing Attacks, FBI Warns

  • Jan 11
  • 2 min read

Key Findings


  • The FBI warns that the North Korea-linked advanced persistent threat (APT) group Kimsuky is targeting governments, think tanks, and academic institutions with "quishing" attacks.

  • Quishing is a social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware.

  • Kimsuky has conducted spear-phishing campaigns using QR codes that impersonate trusted figures like foreign advisors, embassy staff, and think tank employees to lure victims.

  • The QR codes lead to fake questionnaires, bogus secure drives, or attacker-controlled infrastructure designed to steal credentials and establish persistent access.

  • Quishing attacks often evade traditional email security filters and can bypass multi-factor authentication, making them a highly effective identity attack vector.


Background


Kimsuky (also known as ARCHIPELAGO, Black Banshee, Thallium, Velvet Chollima, and APT43) is a North Korea-linked cyberespionage group that has been active since 2013. The group operates under the control of the Reconnaissance General Bureau (RGB), North Korea's foreign intelligence service.


Kimsuky has targeted think tanks, organizations in South Korea, and victims in the United States, Europe, and Russia. In April 2025, researchers discovered a Kimsuky campaign, tracked as Larva-24005, that exploited an RDP vulnerability to gain initial access to target systems.


Quishing Attacks


The FBI reports that in May and June 2025, Kimsuky conducted spear-phishing campaigns using malicious QR codes. The attackers impersonated trusted figures to lure victims into scanning the QR codes, which led to fake questionnaires, bogus secure drives, or attacker-controlled infrastructure designed to steal credentials.


In one case, a fake conference invitation redirected victims to a fraudulent Google login page. In another, a spear-phishing email from a spoofed foreign advisor included a QR code for a questionnaire.


Quishing attacks are effective because QR codes hide the destination URL and often bypass traditional email security filters, making users more likely to trust and scan them. These attacks can lead to the theft and replay of session tokens, allowing attackers to bypass multi-factor authentication.


Recommended Mitigations


The FBI urges organizations to adopt layered defenses against QR code–based spear-phishing, including:


  • Training staff to spot QR-code social engineering, verify sources, and report suspicious scans

  • Securing mobile devices and monitoring QR-linked activity

  • Enforcing phishing-resistant multi-factor authentication, strong passwords, and least-privilege access

  • Keeping systems patched and up-to-date


By implementing these measures, organizations can reduce the risk of falling victim to Kimsuky's quishing attacks and protect against the theft of credentials and persistent access by the North Korea-linked APT group.


Sources


  • https://securityaffairs.com/186755/intelligence/north-korea-linked-apt-kimsuky-behind-quishing-attacks-fbi-warns.html

  • https://x.com/Cyber_O51NT/status/2010153109645852728

  • https://www.facebook.com/thehackernews/posts/%EF%B8%8F-the-fbi-warns-north-korealinked-kimsuky-is-using-qr-codes-in-spear-phishing-em/1264201125744468/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page