BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Kimsuky Hacks Android via QR Code with New DocSwap Malware

North Korean Group Kimsuky Deploys Android Malware DocSwap via QR Code Phishing Targeting CJ Logistics and South Korean Platforms

  • The North Korean group Kimsuky is linked to a new Android Malware campaign using QR codes on phishing sites mimicking CJ Logistics.
  • The malware, called DocSwap, disguises itself as delivery service apps and uses decoded APK loading and RAT features.
  • Victims are tricked into installing the malware through QR codes or phishing URLs, often after scanning prompts on desktop browsers.
  • The malware collects device data, logs keystrokes, records audio and video, and has extensive remote access capabilities.
  • Related phishing sites also target South Korean platforms like Naver and Kakao for credential theft.

A North Korean cyber espionage group known as Kimsuky has launched a campaign distributing a new Android malware variant named DocSwap. This campaign uses QR codes hosted on phishing websites impersonating the Seoul-based logistics company, CJ Logistics (formerly CJ Korea Express). The goal is to deceive users into downloading malicious apps on their mobile devices.

- Advertisement -

The attackers leverage QR codes and notification pop-ups to lure victims into installing the malware. According to ENKI, the malicious app decrypts an embedded APK and executes a remote access trojan (RAT) service. The threat actors mislead users by presenting the app as a legitimate official release to bypass Android’s security warnings about unknown sources.

Phishing messages, including smishing texts and emails, impersonate delivery firms to distribute booby-trapped URLs. When recipients access these URLs from a desktop computer, the site prompts them to scan a QR code on their Android device to install a package tracking app. The page includes a PHP tracking script that inspects the browser’s User-Agent to display a message asking users to install a “security module” under the pretense of customs verification.

If the victim installs the app, an APK file named “SecDelivery.apk” downloads and proceeds to decrypt and load another malicious APK module. This module requests permissions for external storage, internet access, and package installation. Once permitted, it registers a background service called “com.delivery.security.MainService” and displays an OTP verification screen. Users must enter a hardcoded shipment number “742938128549” and then a generated six-digit code.

After verification, the app opens a legitimate CJ Logistics webpage in a WebView but simultaneously connects to a command-and-control server at the IP address “27.102.137[.]181:50005.” The malware can execute up to 57 commands, including keystroke logging, audio and camera recording, file manipulation, and gathering location, SMS messages, contacts, call logs, and installed app lists.

- Advertisement -

In addition to the delivery-themed malware, researchers found other malicious APKs disguised as a P2B Airdrop app and a repackaged version of a legitimate VPN app named BYCOM VPN by the Indian company Bycom Solutions. This demonstrates the threat actor’s use of repackaging legitimate software with malicious code.

Further investigations revealed phishing sites imitating major South Korean platforms like Naver and Kakao. These sites share infrastructure with a previous Kimsuky campaign that targeted Naver users to steal login credentials, as documented in a hunt.io report.

“The executed malware launches a RAT service, capabilities, similarly to past cases but demonstrates evolved such as using a new native function to decrypt the internal APK and incorporating diverse decoy behaviors,” ENKI explained.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

High Gas Prices Fail to Boost Tesla Demand

Tesla shares are heading for their worst quarter in a year ahead of a...

Trump Signature, Face to Appear on US Dollar Bills

For the first time in U.S. history, a sitting president's signature will appear on...

White House Crypto Czar Sacks Steps Down

David Sacks is stepping down as the White House's AI and crypto czar after...

Crypto ‘cop on the beat’ SEC gone, says lawmaker

The U.S. SEC has reportedly dismantled teams responsible for tackling crypto scams and frauds.Congressman...

Ethereum Developers Reject Frame Transactions for 2026 Upgrade

Frame transactions, a proposal for quantum resistance and improved user experience, will not be...

Must Read

How to Buy VPS with Crypto from Hostinger – Step by Step guide

Did you know that nowadays you can use Bitcoin to purchase a Windows VPS? If you’re here, you’re probably wondering how to do it....
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading