Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

APT Kimsuky: North Korea's Spear-Phishing Menace



North Korea-linked APT group Kimsuky is targeting governments, think tanks, and academic institutions with quishing attacks, a type of social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware. The FBI warns that these attacks are highly effective and requires organizations to adopt layered defenses to counter them.

  • The Kimsuky group, also known as APT43, has been conducting sophisticated spear-phishing campaigns targeting governments, think tanks, academic institutions, and strategic advisory firms using malicious QR codes.
  • The group is believed to be controlled by North Korea's foreign intelligence service, the Reconnaissance General Bureau (RGB).
  • Kimsuky actors use quishing attacks, a type of social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware.
  • The group has targeted U.S. and foreign government entities, think tanks, academic institutions, and strategic advisory firms with embedded malicious Quick Response (QR) codes in spear-phishing campaigns.
  • The FBI warns that Kimsuky's quishing attacks are highly effective and requires organizations to adopt layered defenses to counter them.



  • North Korea-linked APT group Kimsuky, also known as ARCHIPELAGO, Black Banshee, Thallium, Velvet Chollima, and APT43, has been making headlines in recent months for its sophisticated spear-phishing campaigns targeting governments, think tanks, academic institutions, and strategic advisory firms. The FBI recently issued an alert warning of the group's activities, highlighting the dangers of quishing attacks, a type of social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware.

    The Kimsuky group is believed to be controlled by the Reconnaissance General Bureau (RGB), North Korea's foreign intelligence service. The group's modus operandi involves sending spear-phishing emails with malicious QR codes, which are designed to evade traditional email security filters and bypass multi-factor authentication. Once a victim scans the QR code, they are redirected to a phishing page that steals their credentials or delivers malware.

    According to the FBI alert, Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR) codes in spear-phishing campaigns. The attacks typically involve spoofing trusted figures such as foreign advisors, embassy staff, and think tank employees to lure victims into scanning QR codes. These codes lead to fake questionnaires, bogus secure drives, or attacker-controlled infrastructure.

    In one notable case, Kimsuky actors sent an email requesting insight from a think tank leader regarding recent developments on the Korean Peninsula. The email provided a QR code to scan for access to a questionnaire. Another campaign involved sending a strategic advisory firm a spear-phishing email inviting recipients to a non-existent conference. The email contained a QR code that directed the user to a registration landing page with a button to register, which took visitors to a fake Google account login page.

    The FBI warns that Kimsuky's quishing attacks are highly effective, as they often bypass standard EDR and network security controls. As a result, organizations must adopt layered defenses to counter these types of attacks. Recommendations include training staff to spot QR-code social engineering, verify sources, and report suspicious scans. Organizations should also secure mobile devices, monitor QR-linked activity, enforce phishing-resistant MFA, strong passwords, least-privilege access, and keep systems patched.

    The Kimsuky group's activities are just one example of the growing threat landscape in the world of cybersecurity. As attackers continue to evolve and adapt their tactics, it is essential for organizations to stay vigilant and take proactive measures to protect themselves against sophisticated threats like quishing attacks.


    North Korea-linked APT group Kimsuky is targeting governments, think tanks, and academic institutions with quishing attacks, a type of social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware. The FBI warns that these attacks are highly effective and requires organizations to adopt layered defenses to counter them.




    Related Information:
  • https://www.ethicalhackingnews.com/articles/APT-Kimsuky-North-Koreas-Spear-Phishing-Menace-ehn.shtml

  • Published: Sat Jan 10 10:06:51 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us