HttpTroy Backdoor Deployed in Targeted South Korean Cyberattack
Summary
Hide ▲
Show ▼
The North Korea-linked threat actor Kimsuky has been linked to a new campaign distributing a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics. The attack involved a ZIP file containing a Microsoft Windows screensaver (.scr) file, which displayed a PDF invoice written in Korean and loaded the attack chain until the backdoor program was running. The article also highlights the advanced obfuscation techniques used by HttpTroy to evade detection and the broader campaign by North Korean state-sponsored groups targeting various sectors. The attack is part of a broader campaign by North Korean state-sponsored groups targeting governments in the Asia-Pacific region, especially South Korea, as well as targets in the United States and Europe. Kimsuky has previously used password-protected ZIP files and AI-generated deepfake photos in their attacks. The groups use legitimate services and Windows processes to dodge security tools and different encryption methods for each step in a multistage infection chain. They also use techniques such as memory-resident execution and dynamic API resolution to help the malicious code avoid detection. Additionally, Kimsuky is targeting organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S. The group is using QR codes in phishing campaigns, a technique known as 'quishing,' to redirect victims to malicious locations disguised as questionnaires, secure drives, or fake login pages. The FBI has warned about Kimsuky's use of malicious QR codes in spear-phishing campaigns targeting entities in the U.S., highlighting the group's history of subverting email authentication protocols and exploiting improperly configured DMARC record policies. Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT). The activity delivers "weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script." The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and deceiving them into downloading a malicious WinRAR self-extracting archive (SFX). Once launched, the archive extracts four different components: a legitimate open-source PDF reader application, a malicious DLL that's sideloaded by the PDF reader, a portable executable (PE) of the Python interpreter, and a RAR file that likely serves as a decoy. The infection chain gets activated when the PDF reader application is run, causing the rogue DLL to be sideloaded. The use of DLL side-loading has become an increasingly common technique adopted by threat actors to evade detection and conceal signs of malicious activity by taking advantage of legitimate processes. Over the past week, at least three documented campaigns have leveraged DLL side-loading to deliver malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity trojans and information stealers. In the campaign observed by ReliaQuest, the sideloaded DLL is used to drop the Python interpreter onto the system and create a Windows Registry Run key that makes sure that the Python interpreter is automatically executed upon every login. The interpreter's primary responsibility is to execute a Base64-encoded open-source shellcode that's directly executed in memory to avoid leaving forensic artifacts on disk. The final payload attempts to communicate with an external server, granting the attackers persistent remote access to the compromised host and exfiltrating data of interest. The abuse of legitimate open-source tools, coupled with the use of phishing messages sent on social media platforms, shows that phishing attacks are not confined to emails alone and that alternative delivery methods can exploit security gaps to increase the odds of success and break into corporate environments. ReliaQuest told The Hacker News that the campaign appears to be broad and opportunistic, with activity spanning various sectors and regions. "That said, because this activity plays out in direct messages, and social media platforms are typically less monitored than email, it's difficult to quantify the full scale," it added. "This approach allows attackers to bypass detection and scale their operations with minimal effort while maintaining persistent control over compromised systems," the cybersecurity company said. "Once inside, they can escalate privileges, move laterally across networks, and exfiltrate data." This is not the first time LinkedIn has been misused for targeted attacks. In recent years, multiple North Korean threat actors, including those linked to the CryptoCore and Contagious Interview campaigns, have singled out victims by contacting them on LinkedIn under the pretext of a job opportunity and convincing them to run a malicious project as part of a supposed assessment or code review. In March 2025, Cofense also detailed a LinkedIn-themed phishing campaign that employs lures related to LinkedIn InMail notifications to get recipients to click on a "Read More" or "Reply To" button and download the remote desktop software developed by ConnectWise for gaining complete control over victim hosts. "Social media platforms commonly used by businesses represent a gap in most organizations' security posture," ReliaQuest said. "Unlike email, where organizations tend to have security monitoring tools, social media private messages lack visibility and security controls, making them an attractive delivery channel for phishing campaigns." "Organizations must recognize social media as a critical attack surface for initial access and extend their defenses beyond email-centric controls."
Timeline
-
20.01.2026 15:46 1 articles · 23h ago
Kimsuky Exploits LinkedIn Messages for RAT Deployment via DLL Sideloading
Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT). The activity delivers "weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script." The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and deceiving them into downloading a malicious WinRAR self-extracting archive (SFX). Once launched, the archive extracts four different components: a legitimate open-source PDF reader application, a malicious DLL that's sideloaded by the PDF reader, a portable executable (PE) of the Python interpreter, and a RAR file that likely serves as a decoy. The infection chain gets activated when the PDF reader application is run, causing the rogue DLL to be sideloaded. The use of DLL side-loading has become an increasingly common technique adopted by threat actors to evade detection and conceal signs of malicious activity by taking advantage of legitimate processes. Over the past week, at least three documented campaigns have leveraged DLL side-loading to deliver malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity trojans and information stealers. In the campaign observed by ReliaQuest, the sideloaded DLL is used to drop the Python interpreter onto the system and create a Windows Registry Run key that makes sure that the Python interpreter is automatically executed upon every login. The interpreter's primary responsibility is to execute a Base64-encoded open-source shellcode that's directly executed in memory to avoid leaving forensic artifacts on disk. The final payload attempts to communicate with an external server, granting the attackers persistent remote access to the compromised host and exfiltrating data of interest. The abuse of legitimate open-source tools, coupled with the use of phishing messages sent on social media platforms, shows that phishing attacks are not confined to emails alone and that alternative delivery methods can exploit security gaps to increase the odds of success and break into corporate environments. ReliaQuest told The Hacker News that the campaign appears to be broad and opportunistic, with activity spanning various sectors and regions. "That said, because this activity plays out in direct messages, and social media platforms are typically less monitored than email, it's difficult to quantify the full scale," it added. "This approach allows attackers to bypass detection and scale their operations with minimal effort while maintaining persistent control over compromised systems," the cybersecurity company said. "Once inside, they can escalate privileges, move laterally across networks, and exfiltrate data." This is not the first time LinkedIn has been misused for targeted attacks. In recent years, multiple North Korean threat actors, including those linked to the CryptoCore and Contagious Interview campaigns, have singled out victims by contacting them on LinkedIn under the pretext of a job opportunity and convincing them to run a malicious project as part of a supposed assessment or code review. In March 2025, Cofense also detailed a LinkedIn-themed phishing campaign that employs lures related to LinkedIn InMail notifications to get recipients to click on a "Read More" or "Reply To" button and download the remote desktop software developed by ConnectWise for gaining complete control over victim hosts. "Social media platforms commonly used by businesses represent a gap in most organizations' security posture," ReliaQuest said. "Unlike email, where organizations tend to have security monitoring tools, social media private messages lack visibility and security controls, making them an attractive delivery channel for phishing campaigns." "Organizations must recognize social media as a critical attack surface for initial access and extend their defenses beyond email-centric controls."
Show sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
18.12.2025 09:43 3 articles · 1mo ago
Kimsuky Distributes DocSwap Android Malware via QR Phishing
Kimsuky is targeting organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S. The group is using QR codes in phishing campaigns, a technique known as 'quishing,' to redirect victims to malicious locations disguised as questionnaires, secure drives, or fake login pages. Kimsuky actors have pretended to be foreign investors, embassy employees, think tank members, and conference organizers to trick victims. In June 2025, Kimsuky sent a spearphishing email inviting recipients to a non-existent conference. Quishing operations frequently end with session token theft and replay, enabling attackers to bypass multi-factor authentication and hijack cloud identities without triggering the typical 'MFA failed' alerts. Quishing attacks are described as an 'MFA-resilient identity intrusion vector' because they originate from unmanaged mobile devices outside standard Endpoint Detection and Response (EDR) and network monitoring. The FBI has warned about Kimsuky's use of malicious QR codes in spear-phishing campaigns targeting entities in the U.S., highlighting the group's history of subverting email authentication protocols and exploiting improperly configured DMARC record policies.
Show sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
03.11.2025 12:42 3 articles · 2mo ago
HttpTroy Backdoor Deployed in Targeted South Korean Cyberattack
The attack involved a ZIP file containing a Microsoft Windows screensaver (.scr) file, which displayed a PDF invoice written in Korean and loaded the attack chain until the backdoor program was running. The article also highlights the advanced obfuscation techniques used by HttpTroy to evade detection and the broader campaign by North Korean state-sponsored groups targeting various sectors. The attack is part of a broader campaign by North Korean state-sponsored groups targeting governments in the Asia-Pacific region, especially South Korea, as well as targets in the United States and Europe. Kimsuky has previously used password-protected ZIP files and AI-generated deepfake photos in their attacks. The groups use legitimate services and Windows processes to dodge security tools and different encryption methods for each step in a multistage infection chain. They also use techniques such as memory-resident execution and dynamic API resolution to help the malicious code avoid detection.
Show sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
Information Snippets
-
Kimsuky, a North Korea-linked threat actor, distributed the HttpTroy backdoor in a targeted attack on a South Korean entity.
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The attack involved a ZIP file named '250908_A_HK이노션_SecuwaySSL VPN Manager U100S 100user_견적서.zip' that masqueraded as a VPN invoice.
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The malware chain includes a dropper, a loader (MemLoad), and the final backdoor (HttpTroy).
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
HttpTroy is capable of file transfer, screenshot capture, command execution, and other malicious activities.
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The malware uses advanced obfuscation techniques to hinder analysis and detection.
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The initial vector is suspected to be a phishing email, as no known vulnerabilities were exploited.
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The malware communicates with a command-and-control server over HTTP POST requests.
First reported: 03.11.2025 12:422 sources, 2 articlesShow sources
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea — thehackernews.com — 03.11.2025 12:42
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The attack chain includes a dropper, a loader (MemLoad), and the final backdoor (HttpTroy).
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The attack involved a ZIP file containing a Microsoft Windows screensaver (.scr) file.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The file displays a PDF invoice written in Korean and loads the attack chain until the backdoor program is running.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
HttpTroy supports a wide range of remote actions and increases stealth by encrypting its communications, obfuscating payloads, and executing code in memory.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The attack is part of a broader campaign by North Korean state-sponsored groups targeting governments in the Asia-Pacific region, especially South Korea, as well as targets in the United States and Europe.
First reported: 05.11.2025 04:002 sources, 2 articlesShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
-
Kimsuky has previously used password-protected ZIP files and AI-generated deepfake photos in their attacks.
First reported: 05.11.2025 04:002 sources, 2 articlesShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
-
Kimsuky and Lazarus groups use legitimate services and Windows processes to dodge security tools and different encryption methods for each step in a multistage infection chain.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
The groups use techniques such as memory-resident execution and dynamic API resolution to help the malicious code avoid detection.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
Defenders should ensure their anti-malware solutions have in-memory scanning to detect payloads loaded directly into memory.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
Threat intelligence can help defenders keep up with attacker methods, especially for frequently targeted sectors such as cryptocurrency, financial systems, aerospace, defense, South Korean government, and healthcare-related entities.
First reported: 05.11.2025 04:001 source, 1 articleShow sources
- Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users — www.darkreading.com — 05.11.2025 04:00
-
Kimsuky has been linked to a new campaign distributing a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics.
First reported: 18.12.2025 09:432 sources, 3 articlesShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile devices.
First reported: 18.12.2025 09:432 sources, 2 articlesShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
-
The malicious app decrypts an embedded encrypted APK and launches a malicious service that provides RAT capabilities.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
The threat actor claims the app is a safe, official release to trick victims into ignoring the warning and installing the malware.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Some of these artifacts masquerade as package delivery service apps.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
The threat actors are using smishing texts or phishing emails impersonating delivery companies to deceive recipients into clicking on booby-trapped URLs hosting the apps.
First reported: 18.12.2025 09:432 sources, 2 articlesShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
-
A noteworthy aspect of the attack is its QR code-based mobile redirection, which prompts users visiting the URLs from a desktop computer to scan a QR code displayed on the page on their Android device to install the supposed shipment tracking app and look up the status.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Present within the page is a tracking PHP script that checks the User-Agent string of the browser and then displays a message urging them to install a security module under the guise of verifying their identity due to supposed 'international customs security policies.'
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Should the victim proceed to install the app, an APK package ('SecDelivery.apk') is downloaded from the server ('27.102.137[.]181').
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
The APK file then decrypts and loads an encrypted APK embedded into its resources to launch the new version of DocSwap, but not before ascertaining that it has obtained the necessary permission to read and manage external storage, access the internet, and install additional packages.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Once it confirms all permissions, it immediately registers the MainService of the newly loaded APK as 'com.delivery.security.MainService.'
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Simultaneously with service registration, the base application launches AuthActivity. This activity masquerades as an OTP authentication screen and verifies the user's identity using a delivery number.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
The shipment number is hard-coded within the APK as '742938128549,' and is likely delivered alongside the malicious URL during the initial access phase.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Once the user enters the provided delivery number, the application is configured to generate a random six-digit verification code and display it as a notification, following which they are prompted to input the generated code.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
As soon as the code is provided, the app opens a WebView with the legitimate URL 'www.cjlogistics[.]com/ko/tool/parcel/tracking,' while, in the background, the trojan connects to an attacker-controlled server ('27.102.137[.]181:50005') and receive as many as 57 commands that allow it to log keystrokes, capture audio, start/stop camera recording perform file operations, run commands, upload/download files, and gather location, SMS messages, contacts, call logs, and a list of installed apps.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
ENKI said it also discovered two other samples disguised as a P2B Airdrop app and a trojanized version of a legitimate VPN program called BYCOM VPN ('com.bycomsolutions.bycomvpn') that's available on the Google Play Store and developed by an Indian IT services company named Bycom Solutions.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
This indicates that the threat actor injected malicious functionality into the legitimate APK and repackaged it for use in the attack.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Further analysis of the threat actor infrastructure has uncovered phishing sites mimicking South Korean platforms like Naver and Kakao that seek to capture users' credentials.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
These sites, in turn, have been found to share overlaps with a prior Kimsuky credential harvesting campaign targeting Naver users.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
The executed malware launches a RAT service, capabilities, similarly to past cases but demonstrates evolved such as using a new native function to decrypt the internal APK and incorporating diverse decoy behaviors.
First reported: 18.12.2025 09:431 source, 1 articleShow sources
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App — thehackernews.com — 18.12.2025 09:43
-
Kimsuky is targeting organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S.
First reported: 09.01.2026 00:571 source, 1 articleShow sources
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
-
Kimsuky is using QR codes in phishing campaigns, a technique known as 'quishing,' to redirect victims to malicious locations disguised as questionnaires, secure drives, or fake login pages.
First reported: 09.01.2026 00:572 sources, 2 articlesShow sources
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Kimsuky actors have pretended to be foreign investors, embassy employees, think tank members, and conference organizers to trick victims.
First reported: 09.01.2026 00:572 sources, 2 articlesShow sources
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
In June 2025, Kimsuky sent a spearphishing email inviting recipients to a non-existent conference.
First reported: 09.01.2026 00:572 sources, 2 articlesShow sources
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Quishing operations frequently end with session token theft and replay, enabling attackers to bypass multi-factor authentication and hijack cloud identities without triggering the typical 'MFA failed' alerts.
First reported: 09.01.2026 00:572 sources, 2 articlesShow sources
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Quishing attacks are described as an 'MFA-resilient identity intrusion vector' because they originate from unmanaged mobile devices outside standard Endpoint Detection and Response (EDR) and network monitoring.
First reported: 09.01.2026 00:572 sources, 2 articlesShow sources
- FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs — www.bleepingcomputer.com — 09.01.2026 00:57
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR) codes in spear-phishing campaigns, referred to as quishing.
First reported: 09.01.2026 07:461 source, 1 articleShow sources
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Kimsuky has a long history of orchestrating spear-phishing campaigns designed to subvert email authentication protocols.
First reported: 09.01.2026 07:461 source, 1 articleShow sources
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Kimsuky exploited improperly configured Domain-based Message Authentication, Reporting, and Conformance (DMARC) record policies to send emails that appear to come from a legitimate domain.
First reported: 09.01.2026 07:461 source, 1 articleShow sources
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Kimsuky actors have utilized malicious QR codes in targeted phishing efforts in May and June 2025, including spoofing a foreign advisor, embassy employee, think tank employee, and sending emails to a strategic advisory firm.
First reported: 09.01.2026 07:461 source, 1 articleShow sources
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Quishing operations frequently end with session token theft and replay, enabling attackers to bypass multi-factor authentication and hijack cloud identities without triggering typical 'MFA failed' alerts.
First reported: 09.01.2026 07:461 source, 1 articleShow sources
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Quishing is considered a high-confidence, MFA-resilient identity intrusion vector in enterprise environments because the compromise path originates on unmanaged mobile devices outside normal Endpoint Detection and Response (EDR) and network inspection boundaries.
First reported: 09.01.2026 07:461 source, 1 articleShow sources
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing — thehackernews.com — 09.01.2026 07:46
-
Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT).
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The activity delivers "weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script."
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and deceiving them into downloading a malicious WinRAR self-extracting archive (SFX).
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
Once launched, the archive extracts four different components: a legitimate open-source PDF reader application, a malicious DLL that's sideloaded by the PDF reader, a portable executable (PE) of the Python interpreter, and a RAR file that likely serves as a decoy.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The infection chain gets activated when the PDF reader application is run, causing the rogue DLL to be sideloaded.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The use of DLL side-loading has become an increasingly common technique adopted by threat actors to evade detection and conceal signs of malicious activity by taking advantage of legitimate processes.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
Over the past week, at least three documented campaigns have leveraged DLL side-loading to deliver malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity trojans and information stealers.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
In the campaign observed by ReliaQuest, the sideloaded DLL is used to drop the Python interpreter onto the system and create a Windows Registry Run key that makes sure that the Python interpreter is automatically executed upon every login.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The interpreter's primary responsibility is to execute a Base64-encoded open-source shellcode that's directly executed in memory to avoid leaving forensic artifacts on disk.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The final payload attempts to communicate with an external server, granting the attackers persistent remote access to the compromised host and exfiltrating data of interest.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
The abuse of legitimate open-source tools, coupled with the use of phishing messages sent on social media platforms, shows that phishing attacks are not confined to emails alone and that alternative delivery methods can exploit security gaps to increase the odds of success and break into corporate environments.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
ReliaQuest told The Hacker News that the campaign appears to be broad and opportunistic, with activity spanning various sectors and regions.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
"That said, because this activity plays out in direct messages, and social media platforms are typically less monitored than email, it's difficult to quantify the full scale," it added.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
"This approach allows attackers to bypass detection and scale their operations with minimal effort while maintaining persistent control over compromised systems," the cybersecurity company said. "Once inside, they can escalate privileges, move laterally across networks, and exfiltrate data."
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
This is not the first time LinkedIn has been misused for targeted attacks. In recent years, multiple North Korean threat actors, including those linked to the CryptoCore and Contagious Interview campaigns, have singled out victims by contacting them on LinkedIn under the pretext of a job opportunity and convincing them to run a malicious project as part of a supposed assessment or code review.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
In March 2025, Cofense also detailed a LinkedIn-themed phishing campaign that employs lures related to LinkedIn InMail notifications to get recipients to click on a "Read More" or "Reply To" button and download the remote desktop software developed by ConnectWise for gaining complete control over victim hosts.
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
"Social media platforms commonly used by businesses represent a gap in most organizations' security posture," ReliaQuest said. "Unlike email, where organizations tend to have security monitoring tools, social media private messages lack visibility and security controls, making them an attractive delivery channel for phishing campaigns."
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
-
"Organizations must recognize social media as a critical attack surface for initial access and extend their defenses beyond email-centric controls."
First reported: 20.01.2026 15:461 source, 1 articleShow sources
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading — thehackernews.com — 20.01.2026 15:46
Similar Happenings
LinkedIn Phishing Campaign Uses Open-Source Pen Testing Tool to Target Business Executives
A phishing campaign on LinkedIn exploits an open-source penetration testing tool to distribute a Remote Access Trojan (RAT) to high-value targets, including business executives and IT administrators. The attack begins with a phishing link sent via private messages, which contains a malicious WinRAR self-extracting archive. This archive extracts a legitimate PDF reader alongside a malicious DLL file, using DLL sideloading to evade detection and achieve persistence on the victim's system. The campaign highlights the growing threat of phishing attacks via social media platforms, which often remain overlooked in corporate security strategies.
PDFSIDER Malware Facilitates Long-Term, Covert System Access
Researchers have identified a new malware strain, PDFSIDER, designed for long-term, covert access to compromised systems. Delivered via DLL side-loading, it installs an encrypted backdoor and evades endpoint detection mechanisms. The malware exhibits advanced capabilities, including stealthy execution, secure communications, and anti-analysis checks, aligning it with APT operations. The infection chain begins with spear-phishing emails containing a ZIP archive with a legitimate, digitally signed executable that impersonates PDF creation software. Once active, PDFSIDER initializes networking components, gathers host details, and establishes an encrypted command-and-control (C2) channel using AES-256-GCM encryption. The malware includes anti-VM checks to detect analysis environments and exits early if thresholds are not met. It also employs DNS traffic on port 53 for data exfiltration to a leased VPS infrastructure. Resecurity assessed PDFSIDER as a targeted tradecraft rather than a mass-delivered threat, with most artifacts evading popular AV and EDR products. PDFSIDER has been deployed in Qilin ransomware attacks and is actively used by multiple ransomware actors. The malware loads into memory, leaving minimal disk artifacts, and uses anonymous pipes to launch commands via CMD. Infected hosts are assigned a unique identifier, and system information is exfiltrated to the attacker’s VPS server over DNS (port 53). The malware uses the Botan 3.0.0 cryptographic library and AES-256-GCM for encryption, decrypting incoming data in memory to minimize its footprint on the host.
PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign
Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025. The campaign delivered the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. The campaign highlights the increasing use of mobile devices as prime targets due to their poor protection and monitoring. Additionally, the Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The threat actor is believed to be active since at least April 2024. The malware is written in Python and establishes communication with a remote server over WebSocket or Message Queuing Telemetry Transport (MQTT). The command-and-control (C2) addresses are retrieved from external paste services such as rentry[.]co and pastebin[.]com, where they are stored in base64-encoded form.
OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
FBI Warns of $262M Stolen in Account Takeover Fraud Schemes
Since January 2025, cybercriminals impersonating bank support teams have stolen over $262 million through account takeover (ATO) fraud schemes. The FBI's Internet Crime Complaint Center (IC3) has received over 5,100 complaints, affecting individuals and businesses across various sectors. Criminals gain unauthorized access to online financial accounts using social engineering techniques or fraudulent websites. Once in control, they wire funds to crypto wallets and often change account passwords, making recovery difficult. The FBI advises monitoring financial accounts, using strong passwords, enabling MFA, and avoiding search results for banking websites. Victims are urged to contact their financial institutions immediately and file complaints with the IC3. Recent reports highlight the growing use of AI-powered phishing campaigns, SEO poisoning, and exploitation of e-commerce vulnerabilities, particularly ahead of the holiday season. Additionally, purchase scams and mobile phishing (mishing) sites have seen a significant increase, leveraging trusted brand names to deceive users. The U.S. Justice Department (DoJ) has seized the fraud domain web3adspanels[.]org, which was used to host and manipulate illegally harvested bank login credentials. The scheme targeted 19 victims across the U.S., including two companies in the Northern District of Georgia, with attempted losses of approximately $28 million and actual losses of approximately $14.6 million. The confiscated domain stored the stolen login credentials of thousands of victims and hosted a backend server to facilitate takeover fraud as recently as November 2025. The FBI and Estonian law enforcement collaborated in this seizure, and the domain now displays a law enforcement banner indicating it is under the control of authorities. No arrests have been made yet, but the investigation may reveal clues leading to the operators.