The FBI is warning that a state-sponsored North Korean hacking group has been using malicious QR codes to help them spy on select users. 

A group known as Kimsuky has been sending the malicious QR codes to victims through emails, the FBI says. QR codes themselves can’t infect or tamper with a phone. But they can forward the user’s device to a malicious website dressed up to trick the user into downloading malware or typing sensitive information into a form. 

The FBI also notes that the same malicious websites can learn details about a user’s device, including IP address, operating system, and location. The site can then serve up a “mobile-optimized” page to impersonate the login portals for Microsoft 365, Okta, or VPNs in an effort to steal credentials. 

Weaponized QR codes aren’t new, but they’re normally associated with scammers rather than state-sponsored hackers. The FBI suggests the North Koreans are using the QR codes to bypass anti-phishing safeguards that involve checking for malicious internet URLs in emails.  

Kimsuky has been around for over a decade, and is known to conduct cyber-spying and intelligence gathering for the North Korean government. However, the group hasn’t traditionally gone after consumers at a large scale. Instead, it select targets through what’s called a “spearphishing” or those tailored to specific individuals. Targets have included officials with think tanks, academic institutions, and members of the US and foreign governments. 

The FBI alert says that in May 2025, Kimsuky sent an email containing a malicious QR code to a think tank leader “regarding recent developments on the Korean Peninsula.” The email included the QR code to “scan for access to a questionnaire.”

Recommended by Our Editors

“Later that month, Kimsuky actors spoofing an embassy employee sent an email requesting input from a senior fellow at a think tank regarding North Korean human rights issues,” the alert adds. “The email contained a QR code that purported to provide access to a secure drive.”

The FBI is urging the public to be aware of the risks of scanning unsolicited QR codes. It also recommends that users “verify QR code sources through secondary means (such as contacting the sender directly), especially before entering login credentials or downloading files.”

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates

SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy
.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

About Our Expert