Attack Report: Custom QR Code Phishing Templates 

Summary: The content discusses the increasing trend of QR code phishing and how hackers are using custom templates specific to each organization to make their attacks unique.

Threat Actor: Unknown | N/A
Victim: Various organizations | N/A

Key Point :

  • QR code phishing, also known as Quishing, has become a popular method for hackers to conduct phishing campaigns.
  • Hackers are now using custom templates specific to each organization, making their attacks unique and harder to detect.
  • In the past 14 days, over 2,000 of these phishing emails have been found, targeting over 1,100 customers.
  • An example of a phishing email posing as an authentication update is provided in the content.

QR Code phishing—or Quishing—has continued to be a hot topic in email security.  

Since the summer, we’ve seen a massive increase in QR phishing, one that continues as we hit the spring: 

  A graph showing numbers and letters

Description automatically generated

 

 Hackers are constantly finding new ways to deploy QR codes in phishing campaigns. In recent weeks, we’ve covered the usage of Conditional QR Code Routing Attacks. 

Now, Harmony Email Researchers have found a new QR campaign, where the hackers are using custom templates specific to each organization, making every attack unique to the company and individual. Over the last 14 days, we’ve found over 2,000 of these emails spread to over 1,100 customers. 
 

Email Example  

 

This attack tries to pose as an authentication update. 

 

It notes that account authentication will quickly expire. To avoid mail disruption, you need to re-authenticate the account. 

We’ve blacked out and cut off a few pieces of information for safety purposes. At the top, which we cut off, the legitimate company logo is present. This changes dynamically depending on the company targeted. This makes the phishing attack seem more legitimate and personalized. 

We’ve also blacked out the part where the hackers insert the name and user name of the victim. Again, this is populated dynamically.  

 Here’s another example: 

 

The formula is the same—add the company logo, add the victim name, and implore them to update their authentication before incurring issues with their email. 

Were the user to scan the QR code, they would be led to a credential harvesting site.  

Techniques 

This is a particularly tricky and clever attack. It’s incredibly personalized and targeted, by providing the legitimate company logo and using the correct name and user name. By changing dynamically depending on the target, this attack is scalable, as well. 

It plays on urgency. By suggesting that email access will be altered, users might be inclined to act quickly. 

The usage of the QR code also conveys a layer of trust. End-users are accustomed to using QR codes, although less so in a business context than as a consumer. Still, it’s a technology that’s familiar.  

And, since you have to scan the QR code on your phone, it also opens the door up for a compromise on that device.  

In short, this is a crafty attack that has the potential to cause serious damage.  

Best Practices: Guidance and Recommendations 

To guard against these attacks, security professionals can do the following: 

  • Implement security that automatically decodes QR codes embedded in emails and analyzes the URLs for malicious content 
  • Utilize security that rewrites the embedded QR code in the email body and replaces it with a safe, re-written link 
  • Implement security that utilizes advanced AI to look at multiple indicators of phishing 

 

Source: https://www.avanan.com/blog/custom-qr-code-phishing-templates


“An interesting youtube video that may be related to the article above”