QR Code phishing—or Quishing—has continued to be a hot topic in email security.  

Since the summer, we’ve seen a massive increase in QR phishing, one that continues as we hit the spring: 

  A graph showing numbers and letters

Description automatically generated

 

 Hackers are constantly finding new ways to deploy QR codes in phishing campaigns. In recent weeks, we’ve covered the usage of Conditional QR Code Routing Attacks. 

Now, Harmony Email Researchers have found a new QR campaign, where the hackers are using custom templates specific to each organization, making every attack unique to the company and individual. Over the last 14 days, we’ve found over 2,000 of these emails spread to over 1,100 customers. 
 

Email Example  

 

This attack tries to pose as an authentication update. 

 

It notes that account authentication will quickly expire. To avoid mail disruption, you need to re-authenticate the account. 

We’ve blacked out and cut off a few pieces of information for safety purposes. At the top, which we cut off, the legitimate company logo is present. This changes dynamically depending on the company targeted. This makes the phishing attack seem more legitimate and personalized. 

We’ve also blacked out the part where the hackers insert the name and user name of the victim. Again, this is populated dynamically.  

 Here’s another example: 

 

The formula is the same—add the company logo, add the victim name, and implore them to update their authentication before incurring issues with their email. 

Were the user to scan the QR code, they would be led to a credential harvesting site.  

Techniques 

This is a particularly tricky and clever attack. It’s incredibly personalized and targeted, by providing the legitimate company logo and using the correct name and user name. By changing dynamically depending on the target, this attack is scalable, as well. 

It plays on urgency. By suggesting that email access will be altered, users might be inclined to act quickly. 

The usage of the QR code also conveys a layer of trust. End-users are accustomed to using QR codes, although less so in a business context than as a consumer. Still, it’s a technology that’s familiar.  

And, since you have to scan the QR code on your phone, it also opens the door up for a compromise on that device.  

In short, this is a crafty attack that has the potential to cause serious damage.  

Best Practices: Guidance and Recommendations 

To guard against these attacks, security professionals can do the following: 

  • Implement security that automatically decodes QR codes embedded in emails and analyzes the URLs for malicious content 
  • Utilize security that rewrites the embedded QR code in the email body and replaces it with a safe, re-written link 
  • Implement security that utilizes advanced AI to look at multiple indicators of phishing