top of page

DPRK Tradecraft Evolution: From Email to QR Code to Blockchain

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 8
  • 3 min read


The FBI Warning (January 8, 2026)




"As of 2025, Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR) codes in spearphishing campaigns."


The technique is called "Quishing"—QR code phishing. Here's why it works:



Traditional Phishing

Quishing

Malicious URL in email body

Malicious URL encoded in QR image

Email security scans and flags URL

QR code is just an image—no URL to scan

Victim clicks on corporate endpoint

Victim scans with mobile phone

Corporate DLP, proxy, EDR all watching

Mobile device has none of that


They're forcing targets off defended infrastructure onto undefended personal devices.





The June 2025 Attack


The FBI documented a specific incident:


  1. Kimsuky sends spearphishing email to a strategic advisory firm

  2. Email invites recipients to a (non-existent) conference

  3. Email contains QR code for "registration"

  4. QR code leads to fake Google login page

  5. Credentials harvested

No malicious attachment. No suspicious URL in the email body. Just an image that your phone happily decodes and opens.





Why This Matters: The Evasion Chain


Email security has gotten better. Defenders improved. So DPRK adapted.


  • Kimsuky exploited weak DMARC policies to spoof trusted senders

  • NSA/FBI joint advisory documented the technique

  • Defense: Organizations hardened DMARC, SPF, DKIM

  • Email body now clean—no URLs to flag

  • QR code forces victim to mobile

  • Bypasses corporate security stack entirely

  • Defense: ...still emerging




The Full Kill Chain


Connect the dots:



┌─────────────────────────────────────────────────────────────────┐
│                    DPRK 2026 KILL CHAIN                         │
├─────────────────────────────────────────────────────────────────┤
│                                                                 │
│  1. INITIAL ACCESS                                              │
│     └── Quishing: QR code in spearphishing email                │
│         └── Target: Think tanks, academia, foreign policy       │
│         └── Evasion: Bypasses email security via image          │
│                                                                 │
│  2. CREDENTIAL HARVEST                                          │
│     └── Fake login page (Google, Microsoft, etc.)               │
│         └── Mobile browser—no corporate proxy                   │
│         └── MFA bypass via real-time phishing frameworks        │
│                                                                 │
│  3. PERSISTENCE                                                 │
│     └── EtherRAT deployment                                     │
│         └── C2 stored in Ethereum smart contract                │
│         └── Queries 9 RPC endpoints with consensus voting       │
│         └── Can't be seized, taken down, or poisoned            │
│                                                                 │
│  4. COLLECTION                                                  │
│     └── Intelligence gathering on NK policy                     │
│         └── Credential reuse across accounts                    │
│         └── Lateral movement to high-value targets              │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘


This is a mature, evolving operation. They're not script kiddies. They're reading the defensive landscape and adapting faster than most enterprises can patch.





Detection Opportunities



For Quishing (QR Code Phishing)


  1. User training: If an email contains a QR code and asks you to scan it, that's suspicious. Legitimate organizations provide clickable links.

  1. QR code scanning in email gateway: Some advanced email security can now decode QR codes and analyze embedded URLs. Enable it if you have it.

  1. Mobile device management: If your users scan a QR code on a corporate mobile device, MDM should be logging and potentially blocking suspicious domains.

  1. Report suspicious QR codes: Establish clear protocols. "I got an email with a QR code" should trigger review.


For EtherRAT/Blockchain C2


  • eth_call

  • eth_getStorageAt

  • Connections to Infura, Alchemy, Ankr, QuickNode

Your web server should not be talking to blockchain nodes. If it is, you're already compromised.


Check persistence locations: `` ~/.config/systemd/user/*.service ~/.config/autostart/*.desktop @reboot cron jobs .bashrc / .profile injections ``





IOCs



EtherRAT Staging (from our December 28 analysis) ``` 193.24.123.68 ```



React2Shell C2 (used in same DPRK campaign) ``` 193.34.213.150 154.89.152.240 107.174.123.91 38.165.44.205 45.76.155.14 216.238.68.169 78.153.140.16 80.64.16.241 2.56.176.35 ```



Domains ``` gfxnick.emerald.usbx.me api.qtss.cc conclusion-ideas-cover-customise.trycloudflare.com proxy1.ip2worlds.vip ```





The Pattern


DPRK isn't standing still. They're evolving on three fronts simultaneously:



Front

Evolution

Our Coverage

Initial Access

Email → QR code (quishing)

This post

Exploitation

Zero-days within 48 hours of disclosure

Persistence

Traditional C2 → Blockchain C2


They read the same research we do. They adapt faster than most defenders. And they're getting better.





Recommendations


  1. Treat QR codes in emails as suspicious by default

  2. Implement phishing-resistant MFA (FIDO2, hardware keys)

  3. Monitor for blockchain RPC traffic from non-blockchain systems

  4. Block the IOCs in this post and our STIX feed

  5. Brief your foreign policy / academic contacts — they're the targets




Get Protected


All IOCs available in machine-readable formats:


STIX 2.1 Feed: ``bash curl https://analytics.dugganusa.com/api/v1/stix-feed ``


Free. Machine-readable. No enterprise contract required.





Sources




About DugganUSA: We publish free threat intelligence for the 99% who can't afford enterprise security. Our STIX 2.1 feed tracks 2,200+ blocked IPs with MITRE ATT&CK attribution. Built on $77/month of Azure Container Apps.





Her name is Renee Nicole Good.


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page