
The FBI has issued an alert to warn organizations of an evolving spearphishing threat from the North Korean state-sponsored cyber actor Kimsuky (also tracked as APT43) that uses malicious QR codes to bypass traditional defenses and steal credentials and session tokens.
According to the alert, the threat group is embedding malicious URLs inside QR codes delivered via highly tailored spearphishing emails — a tactic known as “quishing.”
By forcing targets to scan QR codes with a mobile device, the attackers circumvent corporate email security controls that typically scan and block malicious URLs, giving them a stealthy path into enterprise networks.
Once scanned, these codes direct victims to attacker-controlled infrastructure that performs device fingerprinting and serves up mobile-optimized credential harvesting pages impersonating services such as Microsoft 365, Okta, Google login portals, or VPN web pages.
Attacks often culminate in session token theft and replay, which can let attackers bypass multi-factor authentication (MFA) controls and gain persistent access to cloud accounts without generating typical “MFA failed” alerts.
The advisory outlines several observed quishing campaigns from May and June 2025, where Kimsuky actors impersonated trusted individuals or organizations and used QR codes in targeted emails:
These campaigns targeted think tanks, academic institutions, non-governmental organizations, government entities, and strategic advisory firms — especially those focused on Korean issues and foreign policy.
By directing users away from managed endpoints to unmanaged mobile devices, quishing effectively renders many traditional email and network defenses ineffective. And because credential collection takes place outside the standard security perimeters, organizations can be blindsided by unauthorized account access.
QR-based phishing is increasingly combined with mobile malware distribution, such as Android payloads, that masquerade as benign apps and deliver remote access capabilities when installed.
The alert includes a suite of defenses that organizations should adopt to mitigate this emerging vector:
Affected organizations are urged to maintain robust incident reporting channels with their regional FBI Cyber Squad and IC3 portal to expedite response and intelligence sharing.
Whether at work or in private, Bitdefender recommends you use a scam-detection tool if you're ever suspicious of a certain phone call, email or text. Scamio, our clever chatbot, is designed specifically to combat phony interactions.
You may also want to read:
FBI Warns of Chinese-Language Phone Scam Targeting US Residents
FBI: Scammers Are Posing as Your Bank – Here’s How to Protect Your Account
tags
Filip has 17 years of experience in technology journalism. In recent years, he has focused on cybersecurity in his role as a Security Analyst at Bitdefender.
View all postsDecember 18, 2025
December 11, 2025