Kimsuky Hacks Android via QR Code with New DocSwap Malware

North Korean Group Kimsuky Deploys Android Malware DocSwap via QR Code Phishing Targeting CJ Logistics and South Korean Platforms

  • The North Korean group Kimsuky is linked to a new Android Malware campaign using QR codes on phishing sites mimicking CJ Logistics.
  • The malware, called DocSwap, disguises itself as delivery service apps and uses decoded APK loading and RAT features.
  • Victims are tricked into installing the malware through QR codes or phishing URLs, often after scanning prompts on desktop browsers.
  • The malware collects device data, logs keystrokes, records audio and video, and has extensive remote access capabilities.
  • Related phishing sites also target South Korean platforms like Naver and Kakao for credential theft.

A North Korean cyber espionage group known as Kimsuky has launched a campaign distributing a new Android malware variant named DocSwap. This campaign uses QR codes hosted on phishing websites impersonating the Seoul-based logistics company, CJ Logistics (formerly CJ Korea Express). The goal is to deceive users into downloading malicious apps on their mobile devices.

- Advertisement -

The attackers leverage QR codes and notification pop-ups to lure victims into installing the malware. According to ENKI, the malicious app decrypts an embedded APK and executes a remote access trojan (RAT) service. The threat actors mislead users by presenting the app as a legitimate official release to bypass Android’s security warnings about unknown sources.

Phishing messages, including smishing texts and emails, impersonate delivery firms to distribute booby-trapped URLs. When recipients access these URLs from a desktop computer, the site prompts them to scan a QR code on their Android device to install a package tracking app. The page includes a PHP tracking script that inspects the browser’s User-Agent to display a message asking users to install a “security module” under the pretense of customs verification.

If the victim installs the app, an APK file named “SecDelivery.apk” downloads and proceeds to decrypt and load another malicious APK module. This module requests permissions for external storage, internet access, and package installation. Once permitted, it registers a background service called “com.delivery.security.MainService” and displays an OTP verification screen. Users must enter a hardcoded shipment number “742938128549” and then a generated six-digit code.

After verification, the app opens a legitimate CJ Logistics webpage in a WebView but simultaneously connects to a command-and-control server at the IP address “27.102.137[.]181:50005.” The malware can execute up to 57 commands, including keystroke logging, audio and camera recording, file manipulation, and gathering location, SMS messages, contacts, call logs, and installed app lists.

- Advertisement -

In addition to the delivery-themed malware, researchers found other malicious APKs disguised as a P2B Airdrop app and a repackaged version of a legitimate VPN app named BYCOM VPN by the Indian company Bycom Solutions. This demonstrates the threat actor’s use of repackaging legitimate software with malicious code.

Further investigations revealed phishing sites imitating major South Korean platforms like Naver and Kakao. These sites share infrastructure with a previous Kimsuky campaign that targeted Naver users to steal login credentials, as documented in a hunt.io report.

“The executed malware launches a RAT service, capabilities, similarly to past cases but demonstrates evolved such as using a new native function to decrypt the internal APK and incorporating diverse decoy behaviors,” ENKI explained.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Aave Lab Offers Revenue, New Focus to DAO’s End Feud

Aave Labs has proposed a new framework directing all revenue from Aave-branded products to...

Soldier used military secrets for $150K crypto bets.

An Israeli reserve soldier and a civilian accomplice face charges for allegedly using military...

BitGo, 21Shares Expand ETF Staking & Custody Partnership

BitGo and 21Shares have expanded their partnership to provide custody, trading, and staking services...

North Korean Hackers Use Google’s Gemini AI for Cyber Recon

Google's threat intelligence team observed the North Korean hacking group UNC2970 using the generative...

Binance SAFU Fund Now Holds $1 Billion in Bitcoin

Binance has purchased $305 million in Bitcoin for its user protection fund, bringing its...

Must Read

Top 5 Testing Tools For Blockchain Applications in 2022

Blockchain apps have been adopted popularly by some prominent industries due to its being a decentralized-designed technology. Furthermore, these apps eliminate the risks that...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!