Kimsuky Hacks Android via QR Code with New DocSwap Malware

North Korean Group Kimsuky Deploys Android Malware DocSwap via QR Code Phishing Targeting CJ Logistics and South Korean Platforms

  • The North Korean group Kimsuky is linked to a new Android Malware campaign using QR codes on phishing sites mimicking CJ Logistics.
  • The malware, called DocSwap, disguises itself as delivery service apps and uses decoded APK loading and RAT features.
  • Victims are tricked into installing the malware through QR codes or phishing URLs, often after scanning prompts on desktop browsers.
  • The malware collects device data, logs keystrokes, records audio and video, and has extensive remote access capabilities.
  • Related phishing sites also target South Korean platforms like Naver and Kakao for credential theft.

A North Korean cyber espionage group known as Kimsuky has launched a campaign distributing a new Android malware variant named DocSwap. This campaign uses QR codes hosted on phishing websites impersonating the Seoul-based logistics company, CJ Logistics (formerly CJ Korea Express). The goal is to deceive users into downloading malicious apps on their mobile devices.

- Advertisement -

The attackers leverage QR codes and notification pop-ups to lure victims into installing the malware. According to ENKI, the malicious app decrypts an embedded APK and executes a remote access trojan (RAT) service. The threat actors mislead users by presenting the app as a legitimate official release to bypass Android’s security warnings about unknown sources.

Phishing messages, including smishing texts and emails, impersonate delivery firms to distribute booby-trapped URLs. When recipients access these URLs from a desktop computer, the site prompts them to scan a QR code on their Android device to install a package tracking app. The page includes a PHP tracking script that inspects the browser’s User-Agent to display a message asking users to install a “security module” under the pretense of customs verification.

If the victim installs the app, an APK file named “SecDelivery.apk” downloads and proceeds to decrypt and load another malicious APK module. This module requests permissions for external storage, internet access, and package installation. Once permitted, it registers a background service called “com.delivery.security.MainService” and displays an OTP verification screen. Users must enter a hardcoded shipment number “742938128549” and then a generated six-digit code.

After verification, the app opens a legitimate CJ Logistics webpage in a WebView but simultaneously connects to a command-and-control server at the IP address “27.102.137[.]181:50005.” The malware can execute up to 57 commands, including keystroke logging, audio and camera recording, file manipulation, and gathering location, SMS messages, contacts, call logs, and installed app lists.

- Advertisement -

In addition to the delivery-themed malware, researchers found other malicious APKs disguised as a P2B Airdrop app and a repackaged version of a legitimate VPN app named BYCOM VPN by the Indian company Bycom Solutions. This demonstrates the threat actor’s use of repackaging legitimate software with malicious code.

Further investigations revealed phishing sites imitating major South Korean platforms like Naver and Kakao. These sites share infrastructure with a previous Kimsuky campaign that targeted Naver users to steal login credentials, as documented in a hunt.io report.

“The executed malware launches a RAT service, capabilities, similarly to past cases but demonstrates evolved such as using a new native function to decrypt the internal APK and incorporating diverse decoy behaviors,” ENKI explained.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...

Tesla surges 89% in Norway; France, Sweden plunge 66/71% Dec

Tesla registrations in Norway jumped 89% in December to 5,679 vehicles.Tesla finished 2025 as...
- Advertisement -

Must Read

14 Ways On How to Make Money with Cryptocurrency

Many people want to make money with cryptocurrency because they have heard the success stories of people who became millionaires from zero.If you...
Bitcoin (BTC) $ 90,560.00 3.04%
Ethereum (ETH) $ 3,138.75 5.34%
XRP (XRP) $ 1.98 6.18%
Bittensor (TAO) $ 244.56 8.67%
Polkadot (DOT) $ 2.06 8.03%
Cardano (ADA) $ 0.38922 11.41%
Chainlink (LINK) $ 13.32 7.64%
Hyperliquid (HYPE) $ 24.62 0.92%
Monero (XMR) $ 419.50 0.13%
Hedera (HBAR) $ 0.120253 8.70%
Toncoin (TON) $ 1.82 8.38%