Kimsuky Spearphishing Campaign Targets U.S. with Malicious QR Codes (Quishing), FBI Warns

Published on January 9, 2026
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Threat Actor: North Korean state-sponsored group Kimsuky is behind a new wave of spearphishing attacks utilizing malicious QR codes embedded in emails.
  • Attack Vector: The technique known as "Quishing" bypasses traditional security controls.
  • Target Profile: U.S. and foreign government entities, think tanks, academic institutions, and other foreign policy experts are targeted.

A sophisticated Kimsuky spearphishing campaign targeting U.S. entities. The North Korean state-sponsored actors are now leveraging malicious QR codes. The primary goal is to compel victims to scan the code with a mobile device, thereby bypassing corporate endpoint security and email URL inspection tools.

The Federal Bureau of Investigation (FBI) has issued an alert regarding this technique, also known as Quishing (QR Code Phishing), which involves embedding malicious URLs inside QR codes within spearphishing emails.

Attack Methodology and Targeted Entities

The Quishing attacks are highly targeted. Kimsuky actors have been observed spoofing foreign advisors and embassy employees to lend legitimacy to their communications. Emails containing the QR codes often invite targets to review a questionnaire, access a secure drive, or register for a non-existent conference. 

Once a victim scans the code, they are redirected to an attacker-controlled infrastructure designed to harvest credentials for services like Microsoft 365, VPN portals, or Okta

Successful credential theft enables the attackers to steal session tokens, bypass multi-factor authentication (MFA), and establish persistent access within the target's network.

Because the compromise path originates on unmanaged mobile devices outside normal Endpoint Detection and Response (EDR) and network inspection boundaries, Quishing is now considered a high-confidence, MFA-resilient identity intrusion vector in enterprise environments,” the FBI warning said.

Mitigation of North Korean Cyber Threats

To counter these emerging North Korean cyber threats, the FBI recommends a multi-layered security approach. Recommendations for organizations include:

August reports observed a continued targeting of South Korea in a Kimsuky APT phishing campaign using official-looking lures. However, later that month, the hackers were allegedly exposed in a purported breach that revealed phishing tools and operational data.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: