WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Passthrough – Joint CSA: North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Passthrough – Joint CSA: North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts

Author: Chase Snow

Created: Thursday, May 2, 2024 - 19:01

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

The FBI, the Department of State, and the NSA jointly issued an advisory to highlight attempts by Democratic People’s Republic of Korea (DPRK, a.k.a. North Korea) Kimsuky cyber actors to exploit improperly configured DNS Domain-based Message Authentication, Reporting and Conformance (DMARC) record policies to conceal social engineering attempts. The report contains background on the DPRK’s cyber program and past information-gathering examples, an explanation of how a strong DMARC policy can help block DPRK actors, red flag indicators of malicious activity, two sample emails used by DPRK cyber actors, and mitigation measures.

The authoring agencies seek to bring awareness of these campaigns to degrade or minimize the effectiveness of Kimsuky spearphishing operations. This advisory provides detailed information on how Kimsuky actors exploit DMARC policies; red flags to consider when encountering common themes and campaigns; and general mitigation measures for entities worldwide to implement to better protect against Kimsuky’s computer network exploitation (CNE) operations. To access the full joint CSA, visit NSA.gov.

Additional Resources Pertaining to Social Engineering and DMARC Hygiene:

  • DMARC – The Next Step in Email Hygiene and Security | Tripwire
  • Cyber Resilience – Fending Off Modern Spam Tactics  | WaterISAC

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar