Cybersecurity researchers have uncovered a new Android malware campaign linked to Kimsuky, a hacking group associated with North Korea. In this operation, the attackers are spreading a malicious Android app called DocSwap by tricking users with fake delivery messages and QR codes. The campaign targets Android users by pretending to be legitimate courier or package-tracking services.

The attack usually starts with a phishing message or webpage that claims a package delivery requires confirmation. These messages often look convincing and are designed to create urgency. Victims are asked to scan a QR code or tap a link to track their delivery. Instead of opening a real courier page, the QR code redirects the user to a website controlled by the attackers.
On the fake website, users are prompted to download an Android application. The app is disguised as a delivery assistant, document viewer, or security-related tool. In reality, this app contains the DocSwap malware. Since the app is not downloaded from the Google Play Store, users must enable “install from unknown sources,” which helps the malware bypass normal security checks.

Once installed, DocSwap hides its malicious behavior. The app decrypts and activates a hidden payload in the background, allowing attackers to remotely control the infected device. Researchers have confirmed that DocSwap functions as a remote access trojan (RAT). It can collect sensitive information from the phone, steal files, record audio, monitor keystrokes, and send collected data back to the attackers’ command-and-control servers.
The malware is designed to stay unnoticed. It uses encrypted components and native Android features to avoid detection. Some versions disguise their activity by pretending to be running system services, making it difficult for users to realize their device has been compromised. Researchers also observed that the attackers used multiple versions of the app and changed server infrastructure to avoid being blocked.

Security analysts attributed the campaign to Kimsuky based on several indicators. These include similarities in attack techniques, reuse of infrastructure, Korean-language traces in code, and behavioral patterns that match earlier Kimsuky operations. Kimsuky is known for cyber espionage campaigns targeting governments, researchers, journalists, and organizations of strategic interest.
What makes this campaign especially dangerous is the use of QR-code phishing. QR codes are widely trusted and are increasingly used for payments, menus, and deliveries. Attackers take advantage of this trust, knowing that many users scan QR codes without checking the source. Since QR codes hide the actual URL, users may not realize they are being redirected to a malicious website.
Researchers warn that campaigns like this highlight the growing risk of mobile malware outside official app stores. Unlike Play Store apps, sideloaded APK files do not go through Google’s security screening. This makes them a popular choice for threat actors looking to distribute malware quietly.
Experts advise Android users to avoid installing apps from unknown websites and to be cautious with delivery-related messages that request QR scans or downloads. Any unexpected delivery notice should be verified directly through the official website or app of the courier company. Disabling “install from unknown sources” and using mobile security tools can significantly reduce the risk of infection.
This incident shows how threat actors like Kimsuky continue to evolve their tactics, shifting toward mobile platforms and social engineering methods. As QR codes become more common, cybersecurity experts stress the need for greater user awareness to prevent similar attacks in the future.
Stay alert, and keep your security measures updated!
Source: Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news
