Kimsuky Hacks Android via QR Code with New DocSwap Malware

North Korean Group Kimsuky Deploys Android Malware DocSwap via QR Code Phishing Targeting CJ Logistics and South Korean Platforms

  • The North Korean group Kimsuky is linked to a new Android Malware campaign using QR codes on phishing sites mimicking CJ Logistics.
  • The malware, called DocSwap, disguises itself as delivery service apps and uses decoded APK loading and RAT features.
  • Victims are tricked into installing the malware through QR codes or phishing URLs, often after scanning prompts on desktop browsers.
  • The malware collects device data, logs keystrokes, records audio and video, and has extensive remote access capabilities.
  • Related phishing sites also target South Korean platforms like Naver and Kakao for credential theft.

A North Korean cyber espionage group known as Kimsuky has launched a campaign distributing a new Android malware variant named DocSwap. This campaign uses QR codes hosted on phishing websites impersonating the Seoul-based logistics company, CJ Logistics (formerly CJ Korea Express). The goal is to deceive users into downloading malicious apps on their mobile devices.

- Advertisement -

The attackers leverage QR codes and notification pop-ups to lure victims into installing the malware. According to ENKI, the malicious app decrypts an embedded APK and executes a remote access trojan (RAT) service. The threat actors mislead users by presenting the app as a legitimate official release to bypass Android’s security warnings about unknown sources.

Phishing messages, including smishing texts and emails, impersonate delivery firms to distribute booby-trapped URLs. When recipients access these URLs from a desktop computer, the site prompts them to scan a QR code on their Android device to install a package tracking app. The page includes a PHP tracking script that inspects the browser’s User-Agent to display a message asking users to install a “security module” under the pretense of customs verification.

If the victim installs the app, an APK file named “SecDelivery.apk” downloads and proceeds to decrypt and load another malicious APK module. This module requests permissions for external storage, internet access, and package installation. Once permitted, it registers a background service called “com.delivery.security.MainService” and displays an OTP verification screen. Users must enter a hardcoded shipment number “742938128549” and then a generated six-digit code.

After verification, the app opens a legitimate CJ Logistics webpage in a WebView but simultaneously connects to a command-and-control server at the IP address “27.102.137[.]181:50005.” The malware can execute up to 57 commands, including keystroke logging, audio and camera recording, file manipulation, and gathering location, SMS messages, contacts, call logs, and installed app lists.

- Advertisement -

In addition to the delivery-themed malware, researchers found other malicious APKs disguised as a P2B Airdrop app and a repackaged version of a legitimate VPN app named BYCOM VPN by the Indian company Bycom Solutions. This demonstrates the threat actor’s use of repackaging legitimate software with malicious code.

Further investigations revealed phishing sites imitating major South Korean platforms like Naver and Kakao. These sites share infrastructure with a previous Kimsuky campaign that targeted Naver users to steal login credentials, as documented in a hunt.io report.

“The executed malware launches a RAT service, capabilities, similarly to past cases but demonstrates evolved such as using a new native function to decrypt the internal APK and incorporating diverse decoy behaviors,” ENKI explained.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin ETF Inflows Hit $462M as BTC Tops $73K

U.S. spot Bitcoin ETFs saw a surge of $462 million in net inflows, marking...

Tycoon 2FA Phishing-As-A-Service Shut Down

Law enforcement dismantled Tycoon 2FA, a major Phishing-as-a-Service platform used in tens of thousands...

$1B Inflows Fuel Crypto Rebound As Bitcoin Surges Past $70K

Crypto funds saw $1 billion in weekly inflows, the largest since January, breaking a...

Senator: White House Staff May Have Profited Off Iran Strikes

Senator Chris Murphy alleges individuals with White House access placed six-figure bets on a...

Arthur Hayes Warns Bitcoin Rally Could Be a ‘Dead Cat Bounce’

Arthur Hayes of Maelstrom warned that Bitcoin’s rally might be a ‘dead cat bounce’...

Must Read

How Cryptocurrency Works For Beginners?

Welcome to the world of cryptocurrency! If you're new to this exciting and rapidly evolving landscape, you might feel like Alice in Wonderland, exploring...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!