Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
Briefly

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
""The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile devices," ENKI said. "The malicious app decrypts an embedded encrypted APK and launches a malicious service that provides RAT capabilities." "Since Android blocks apps from unknown sources and displays security warnings by default, the threat actor claims the app is a safe, official release to trick victims into ignoring the warning and installing the malware.""
""A noteworthy aspect of the attack is its QR code-based mobile redirection, which prompts users visiting the URLs from a desktop computer to scan a QR code displayed on the page on their Android device to install the supposed shipment tracking app and look up the status. Present within the page is a tracking PHP script that checks the User-Agent string of the browser and then displays a message urging them to install a security module under the guise of verifying their identity""
Kimsuky operators are conducting a campaign that uses phishing sites impersonating Seoul-based CJ Logistics to deliver a new Android malware variant via QR codes and booby-trapped URLs. The malicious flow uses QR code-based mobile redirection and notification pop-ups to convince Android users to install a forged shipment-tracking app. The initial APK (SecDelivery.apk) downloads and decrypts an embedded encrypted APK, then launches a DocSwap RAT-like service after ensuring required permissions. A tracking PHP script on the phishing pages checks User-Agent and prompts installation of a fake security module under the pretext of customs verification.
Read at The Hacker News
Unable to calculate read time
[
|
]