FBI: North Korea's Kimsuky APT Using 'Quishing' to Bypass MFA

FBI Warns of North Korean 'Quishing' Campaigns by Kimsuky (APT43) Targeting Government and Academia

HIGH
January 9, 2026
6m read
PhishingThreat ActorPolicy and Compliance

Related Entities

Threat Actors

Kimsuky APT43 Emerald Sleet

Full Report

Executive Summary

The U.S. Federal Bureau of Investigation (FBI) has released a security advisory detailing an evolving tactic used by the North Korean state-sponsored hacking group Kimsuky (also known as APT43, Emerald Sleet). The group is embedding malicious Quick Response (QR) codes in spear-phishing emails to steal credentials and bypass security controls. This technique, known as "quishing," targets U.S. and foreign government entities, academic institutions, and think tanks. By luring victims to scan a QR code with a mobile device, the attackers shift the interaction from a secured corporate environment to a less-protected personal one, facilitating credential harvesting and session hijacking that can circumvent multi-factor authentication (MFA).


Threat Overview

The quishing attack chain employed by Kimsuky is designed to be both deceptive and technically evasive:

  1. Spear-Phishing: The attackers send a targeted email, often spoofing a legitimate entity like a government advisor or embassy employee.
  2. The Lure: The email contains a malicious QR code, either as an embedded image or a PDF attachment. The message entices the user to scan the code to access a document, questionnaire, or secure drive.
  3. Evasion & Context Shift: Because the malicious destination is a QR code image, it bypasses many automated URL scanning and sandboxing tools in email gateways. When the user scans the code, they are forced to use their personal mobile device, moving the attack surface outside the protected corporate network.
  4. Redirection & Harvesting: The QR code directs the mobile browser through a series of attacker-controlled redirectors that fingerprint the device and user. The final destination is a convincing phishing page designed to harvest credentials (e.g., a fake Microsoft 365 login page).
  5. MFA Bypass: The primary goal is often not just the password but the session token generated after a successful login. By capturing this token, attackers can perform session replay attacks to gain access to cloud services without needing the password or a fresh MFA prompt.

Technical Analysis

Quishing is effective because it exploits both human psychology and technical security gaps. Users are generally less suspicious of QR codes than they are of hyperlinks. The shift to a mobile device breaks the chain of security controls present on a corporate laptop, such as endpoint protection, network filtering, and browser extensions.

The FBI's advisory highlights that this is a high-confidence, MFA-resilient intrusion vector. Standard MFA implementations can be bypassed if the attacker successfully hijacks an authenticated session. Once they have access to a victim's account and mailbox, Kimsuky actors establish persistence and use the compromised identity to launch secondary spear-phishing attacks against the victim's contacts, lending legitimacy to their follow-on campaigns.

MITRE ATT&CK Techniques

Impact Assessment

The impact of a successful quishing attack against targeted individuals can be severe:

  • Credential Compromise: Loss of usernames and passwords for critical accounts.
  • Cloud Account Takeover: Hijacking of email, collaboration, and cloud storage accounts (e.g., Microsoft 365, Google Workspace).
  • Espionage: Access to sensitive government, policy, or research documents.
  • Further Infiltration: Use of the compromised account as a trusted pivot point to attack other individuals and organizations.

Detection & Response

  • User Behavior Analysis (D3-UBA): Monitor cloud and identity logs for anomalous session activity. Look for logins from impossible-travel scenarios, unusual user-agents, or session usage from multiple IP addresses or geolocations simultaneously.
  • Email Content Analysis: While difficult, advanced email security solutions may be able to use computer vision to identify and analyze QR codes within email bodies and attachments.
  • Incident Response: If a quishing attack is suspected, immediately trigger an incident response playbook that includes revoking all active user sessions, forcing a password reset, and reviewing mailbox rules and account activity for signs of persistence or secondary phishing.

Mitigation

  • User Training (M1017): This is the most critical defense. Educate users to be highly suspicious of any unsolicited QR codes received via email, especially those asking for credentials or access to documents. Emphasize that a QR code is just a link and should be treated with the same caution.
  • Phishing-Resistant MFA: Move towards phishing-resistant MFA methods like FIDO2/WebAuthn, which bind the authentication to the hardware and origin, making session token theft ineffective.
  • Mobile Device Management (MDM): If possible, enforce security policies on mobile devices that access corporate resources, including the use of approved browsers with security features and endpoint protection.
  • Restrict Web-Based Content (M1021): Use DNS filtering and web proxies on both corporate and managed mobile devices to block access to known malicious domains and newly registered domains.

Timeline of Events

1
May 1, 2025
FBI notes specific instances of Kimsuky quishing campaigns targeting think tank personnel.
2
January 9, 2026
This article was published

MITRE ATT&CK Mitigations

Educate users on the risks of scanning unsolicited QR codes and to treat them with the same suspicion as unknown links or attachments.

Implement phishing-resistant MFA, such as FIDO2, to prevent session hijacking attacks from being effective.

Mapped D3FEND Techniques:

Monitor for anomalous user session behavior, such as impossible travel or unusual user agents, to detect hijacked sessions.

D3FEND Defensive Countermeasures

To counter the MFA-bypass aspect of Kimsuky's quishing attacks, organizations must focus on detecting anomalous session activity post-authentication. This involves implementing User Behavior Analytics (UBA) capabilities, either standalone or within a SIEM/XDR platform. Configure policies to detect and alert on 'impossible travel' (e.g., logins from different continents in a short time), session replays from different user-agents or IP addresses than the initial login, and unusual patterns of resource access. For example, if a user who normally only accesses email suddenly attempts to download large volumes of files from SharePoint, this should trigger a high-priority alert. This moves the defense from the point of authentication to the entire lifecycle of the user session, providing a critical backstop against session token theft.

While Kimsuky's attack is designed to bypass some forms of MFA, not all MFA is created equal. Organizations should prioritize migrating from less secure factors like SMS and push notifications (which are vulnerable to fatigue attacks) to truly phishing-resistant MFA. The gold standard is FIDO2/WebAuthn, which uses public-key cryptography and binds the user's authentication to their specific device and the legitimate website's origin. This cryptographic binding makes it impossible for an attacker to capture a credential or session token on a phishing site and replay it on the real site. While a full rollout can be a long-term project, prioritize FIDO2 for privileged users and those in high-risk departments (e.g., finance, executive leadership, system administrators) who are likely targets for groups like Kimsuky.

Sources & References

FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
The Hacker News (thehackernews.com) January 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

quishingQR codephishingKimsukyAPT43FBIMFA bypassNorth Korea

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading