Structured data rendered for: WebPage
Back to Blog

North Korean Threat Actor Kimsuky Distributing DocSwap Android Malware

December 18, 2025
2 min read
North Korean Threat Actor Kimsuky Distributing DocSwap Android Malware

North Korean Threat Actor Kimsuky Distributing DocSwap Android Malware

A new Android malware variant called DocSwap is being distributed by North Korean threat actor Kimsuky through QR code phishing campaigns. The malware masquerades as a delivery tracking app, specifically impersonating CJ Logistics, a major Korean logistics company.

Attack Vector

The threat actor uses smishing texts and phishing emails containing URLs that redirect users to fake delivery tracking websites. When scanned on a mobile device, QR codes on these phishing sites prompt users to install what appears to be an official security module or delivery tracking application. The malware leverages social engineering tactics, claiming the installation is required for "international customs security policies" to overcome Android's built-in security warnings.

Technical Details

Once installed, the malware decrypts an embedded encrypted APK to launch DocSwap's main service. The attack includes a sophisticated authentication flow disguised as an OTP verification screen, using a hard-coded delivery number to appear legitimate. After the victim completes the fake verification process, the trojan connects to attacker-controlled servers and can execute up to 57 different commands.

Capabilities

DocSwap functions as a Remote Access Trojan (RAT) with extensive surveillance capabilities, including keystroke logging, audio capture, camera recording, file operations, command execution, and data exfiltration of SMS messages, contacts, call logs, location data, and installed applications.

Recommendations

Users should verify the authenticity of delivery apps before installation, be cautious when scanning QR codes, use multi-factor authentication, and keep their mobile devices and security software up to date. Organizations should educate employees about phishing and smishing tactics targeting mobile devices.

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.