Want a clear, structured way to learn?

No hype. Just a step-by-step framework you can follow at your own pace.

Try This Structured Crypto Training

FBI Warns of North Korea–Linked QR Phishing: How Crypto Users Can Avoid Wallet Drains and Account Takeovers

Reports warn of QR-code phishing campaigns tied to North Korean actors, pushing victims to fake login pages or malicious apps that can lead to wallet drains or exchange account takeover. This guide explains the pattern and practical checks before scanning.

Jan 9, 2026 • 6 min read

FBI Warns of North Korea–Linked QR Phishing: How Crypto Users Can Avoid Wallet Drains and Account Takeovers

TL;DR (3 bullets)

Problem overview

Recent law-enforcement warnings highlight a familiar pattern: threat actors use QR codes to trick people into visiting fake login pages, installing malicious apps, or authorizing transactions that drain crypto wallets. In some cases, the goal is account takeover (stealing exchange credentials or session tokens). In others, it’s wallet draining via deceptive “connect wallet” prompts, malicious signature requests, or approvals that grant ongoing permission to move tokens.

QR phishing can be especially effective because it shifts the victim onto a phone, where it’s harder to inspect addresses, compare domains, or use certain browser protections. The QR itself may be posted in public places, sent in a direct message, embedded in a fake invoice, or presented as a “verification” step by an impersonated support agent.

Why it happens

Solutions (numbered)

  1. Do not scan first; verify first. If a QR claims to be from an exchange, wallet provider, or your workplace, open the official app and navigate to the relevant page manually (or type the known domain yourself). If it’s legitimate, you should be able to reach the same function without scanning.

  2. Inspect the destination before you open it. Many camera apps show a preview of the link. Look for lookalike spellings, extra words, or strange subdomains. If anything feels off, stop and use official navigation instead.

  3. Never “log in” from a QR in a message. QR login flows can be legitimate, but they’re frequently abused. Prefer logging in from your saved bookmark, the official app, or by typing the address. If a support agent asks you to scan a code to “secure” your account, treat it as suspicious.

  4. Harden wallet interactions. Use a hardware wallet when possible. Read signature and approval prompts carefully: if the request is unrelated to what you’re doing, reject it. Avoid blind signing. If your wallet supports it, enable transaction simulation or human-readable previews.

  5. If you scanned a suspicious QR, contain and recover. Disconnect the wallet from the site, revoke token approvals, and move remaining assets to a fresh wallet that has never interacted with the suspicious site. For exchange accounts, reset password and 2FA, sign out of all sessions, and check API keys and withdrawal addresses.

  6. Preserve evidence and report. Take screenshots of the QR, the message context, the destination page, and any transaction hashes. Keep timestamps. Report through official channels (exchange support inside the app, wallet provider support pages, and relevant law-enforcement reporting portals in your jurisdiction).

Prevention checklist

FAQ (5 Q&A)

Q1: Can a QR code drain my wallet just by scanning it?
A: Scanning typically opens a link or triggers an action; the drain usually happens after you approve something (login, signature, token approval, or transaction). Still, treat scanning as a high-risk step because it can lead you into a convincing trap.

Q2: What are common red flags on QR-driven crypto pages?
A: Urgency (“verify in 10 minutes”), requests for seed phrases, unexpected wallet-connection prompts, mismatched branding, odd domain spellings, and signature requests that don’t match what you’re trying to do.

Q3: I connected my wallet to a site from a QR. What should I do now?
A: Disconnect, revoke approvals, and move funds to a new wallet if you suspect malicious intent. Then check your wallet’s recent activity and keep records of what happened in case you need to report it.

Q4: How do account takeovers happen with QR phishing?
A: The QR may lead to a fake exchange login, capture credentials, or trick you into approving a malicious “login” that steals session access. After takeover, attackers may change security settings, add API keys, or attempt withdrawals.

Q5: What evidence is most useful if I need help from an exchange or investigator?
A: Screenshots of the message and QR, the exact text used to pressure you, the destination page visuals, transaction IDs, wallet addresses involved, timestamps, and any email or in-app notifications about logins or security changes.

Key takeaways (3 bullets)


Sources

Buttons open external references.

Related posts

OKX Adds Pre-Withdrawal Scam Screening: What It Means for Users Seeing “Risk” or Delayed Withdrawals

Users are increasingly running into extra checks, risk flags, or delays when withdrawing crypto as exchanges add scam-detection tooling. Here’s what “pre-withdrawal scam screening” is, why it’s rolling out now, and what to do if your transfer is flagged.

Discord Bot OpenClaw Bans Bitcoin/Crypto Mentions After Fake Token Scare: What Users Should Know

Users report an AI agent/bot (OpenClaw) banning Bitcoin/crypto mentions on Discord following a fake token scare—raising moderation, community access, and scam-risk concerns. Here’s what happened, why it matters, and safer ways to verify official channels.

Step Finance Shutdown After Exploit: What Solana Users Should Check (Wallets, Approvals, and App Access)

Step Finance reportedly shut down after an exploit, raising urgent questions for Solana users about whether their wallets or connected apps are at risk. Here’s what to verify now: access points, transaction history, and any active permissions tied to the app.

Government Official Impersonation Scams: How Fake Authorities Pressure Victims Into Crypto Payments

Reports show a surge in “government official” (and inspector) impersonation scams, where victims are pressured into urgent crypto or other hard-to-reverse payments. This post breaks down common scripts, warning signs, and safer verification steps.

Coinbase Stock Trading Launch: Common User Confusion About Orders, Fees, and Account Setup

Coinbase has started offering stock trading, and users are running into avoidable issues: mixing brokerage vs. crypto accounts, misunderstanding order types and routing, and being surprised by fees, settlement times, and transfer limits. Here’s what to check first.


Prefer structured learning over guesswork?

If you’re building a safer approach, start with a framework.

Try This Structured Crypto Training