Skip to main content
New AI-powered DMARC analysis + open REST API See how → →
Foundational 5 min read

Understanding Kimsuky's Latest Phishing Tactics: Exploiting DMARC “None” Policies

Brad Slavin
Brad Slavin General Manager
Updated April 16, 2026 | Updated for 2026

Quick Answer

_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies

Related: Free DMARC Checker

Understanding Kimsuky's Latest Phishing Tactics: Exploiting DMARC “None” Policies

Try Our Free DMARC Checker

Validate your DMARC policy, check alignment settings, and verify reporting configuration.

Check DMARC Record →
Dmarc analyzer 3 150x150

The support tickets we get after a spoofing incident all start the same way: ‘we didn’t know someone was sending email from our domain,’ says Vasile Diaconu, Operations Lead at DuoCircle. DMARC reporting would have caught it weeks earlier. The cost of monitoring is nothing compared to the cost of a successful impersonation attack.

_According to the FBI’s 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report

Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies

					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						

Play Episode

					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						

Pause Episode

					</button>
					


				

				

					<audio preload="none" class="clip clip-13046">
						<source src="https://media.mailhop.org/dmarcreport/images/2024/05/Understanding-Kimsukys-Latest-Phishing-Tactics-Exploiting-DMARC-None-Policies.mp3">
					</audio>
					

						

					

					

						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								

Mute/Unmute Episode

							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								

Rewind 10 Seconds

							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								

Fast Forward 30 seconds

							</button>
						

						

							<time class="ssp-timer">00:00</time>
							

/

							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M18S">2:18</time>
						

					

				

			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-13046" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-13046" title="Share">Share</button>
										</nav>
						

	



		

						

				

					

					

				

				

					

																																																																								

					

						

RSS Feed

							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-13046" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-13046" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

				

			

									

				

					

					

				

				

					

						Share						

					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/understanding-kimsukys-latest-phishing-tactics-exploiting-dmarc-none-policies/&t=Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies"
						 target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/understanding-kimsukys-latest-phishing-tactics-exploiting-dmarc-none-policies/&url=Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies"
						 target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2024/05/Understanding-Kimsukys-Latest-Phishing-Tactics-Exploiting-DMARC-None-Policies.mp3"
						 target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

				

				

					

						Link						

					

						<input value="https://dmarcreport.com/blog/podcast/understanding-kimsukys-latest-phishing-tactics-exploiting-dmarc-none-policies/" class="input-link input-link-13046" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-13046" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
				

				

					

						Embed						

					

/*! This file is auto-generated */ ’ title=“Embed Code” class=“input-embed input-embed-13046” readonly/>

					<button class="copy-embed copy-embed-13046" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
				

			

				



News Flash: The infamous North Korean group of hackers - Kimsuky strikes back!

Kimsuky is not a new name in the cybersecurity circle, as it is well known for pulling off sophisticated email-based attacks and leveraging social engineering tactics. But this time, they have changed their approach and shifted their focus towards organizations that have DMARC (Domain-based Message Authentication, Reporting, and Conformance) policies set to “none.” You might think of this as a harmless setting or a minor oversight in security strategy, but the way it is **capitalized by the attackers shows that this critical loophole is not trivial and can jeopardize your organization’s integrity.

Looking at the severity of the attacks caused by Kimsuky by targeting a seemingly inconsequential vulnerability, the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) issued a joint advisory on May 2, 2024. The advisory stressed the far-reaching impact of Kimsuky’s targeted **spear-phishing campaigns and urged organizations to reassess their email security protocols, particularly DMARC policies.

Dmarc analyzer

Considering that the advisory came from two of the most important national security bodies in the world, the gravity of the situation certainly cannot be neglected. Let us dig deeper into this and learn more about the **latest tactics of the North Korean cyberattacker group.

Why You Should Be Wary of Kimsuky?

Kimsuky is a group of hackers from North Korea that is known for carrying out some of the **most serious cyber attacks targeting organizations in South Korea, Russia, the US, and Europe. Since the group has been around, causing significant damage , for more than a decade now, they have mastered the art of high-profile attacks.

Some of the most notable attacks so far include:

With victims spanning all across the world and a history of sophisticated attacks , it is safe to say that Kimsuky is no less than a global threat.

What Goes Behind the Kimsuky Phishing Attacks?

What ties all of the above-mentioned attacks together is the **strategy employed behind them. Let us look at what makes these attacks so grave and hard to evade.

Kimsuky usually tricks people with emails that look like they are from legitimate government agencies or other trustworthy groups. They set up fake websites and send emails that look real to trick people into giving away private information like passwords.

Most importantly, they don’t just send one email but several emails over a period of time with an aim to gradually build trust. Once the unsuspecting victim believes they are engaging with a legitimate source, Kimsuky plays its master stroke, that is, sending the final email that contains an attachment or link to malicious software.

What are the 2024 Kimsuky Phishing Attacks All About?

As we mentioned earlier, Kimsuky’s recent phishing attacks saw a strategic shift in its approach. In the 2024 wave, the group further refined its techniques to **exploit specific vulnerabilities in organizational email systems, particularly those with inadequate DMARC policies.

What is dmarc

Kimsuky targeted organizations with the DMARC policy set to “none.” This lenient or non-existent DMARC setting gave them the way to execute their nefarious plans with little to no resistance . When set to “none,” the policy does not enforce any action on emails that fail authentication checks, meaning fraudulent emails can reach their intended targets without being blocked or flagged. This passive approach works well when you have to simply monitor your emails and check for authentication failures, but it takes no action against actual threats. Hence, a loophole like this opens the floodgate for phishing attacks .

How Can You Protect Against Kimsuky Phishing Attacks that Target Weak DMARC Policies?

To safeguard organizations from the wrath of Kimsuky attacks, the FBI has issued a list of preventive measures. Let us take a look at them:

Be Strategic When Advancing DMARC Policies

To ensure comprehensive protection against spoofing or phishing attacks, it is important that you upgrade and actively manage your DMARC settings. But while doing this, make sure that you do **not jump the gun to implement the “reject” policy or, even worse, stay stagnant at “none.” By gradually transitioning from “none” to “quarantine” and ultimately to “reject,” you can seamlessly fine-tune your organization’s email security without disrupting legitimate communication.

Do not Ignore the Red Flags in Emails

While you might not be able to spot a malicious email at first glance, if you look closely, you will notice some giveaway signs of a phishing email that you should not ignore. These red flags are fairly common but often go unnoticed, like grammatical errors, awkward sentence phrasing, emails with malicious links or attachments, etc.

Another major red flag is the origin of the email. Phishing emails often come from spoofed domains that include misspellings or incorrect domain names that look similar to verified ones at a quick glance.

Wrapping Up

If you think attackers will not reach your organization, you will be making a grave mistake! The truth is, no organization, big or small, is invincible and can escape the clutches of such attacks. But by following a robust approach, you can significantly reduce your chances of coming under the radar of vile groups like Kimsuky.

A good starting and **non-negotiable point is the strategic implementation of DMARC policies, moving from a “none” to more secure configurations such as “quarantine” or “reject.” Rest assured, this adjustment alone can dramatically decrease the likelihood of phishing emails reaching your mailboxes. Need help enforcing DMARC policies for your domain ? DMARCReport is here to your rescue!

Get in touch with us or book a demo with DMARCReport to secure your email channels effectively and **protect your organization from the sophisticated threats posed by groups like Kimsuky.

Brad Slavin
Brad Slavin

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

LinkedIn Profile →

Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.