{"id":6949,"date":"2023-09-22T09:13:52","date_gmt":"2023-09-22T09:13:52","guid":{"rendered":"https:\/\/fortgale.com\/blog\/?p=6949"},"modified":"2025-01-09T22:51:01","modified_gmt":"2025-01-09T22:51:01","slug":"quishing-phishing-emails-qr-codes-threat-actors","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/defence\/quishing-phishing-emails-qr-codes-threat-actors\/","title":{"rendered":"The Rising Threat of QR Code-Enabled Phishing Emails: Quishing"},"content":{"rendered":"\n<p>In the ever-evolving landscape of cyber threats, threat actors are constantly seeking new and innovative ways to deceive and compromise unsuspecting targets. One of the latest techniques that Fortgale observed gaining prominence over the last few months is the<strong> utilization of QR codes in phishing email campaigns<\/strong> (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/002\/\">Spearphishing Technique &#8211; T1566<\/a>).<\/p>\n\n\n\n<p>In this article, we delve into the phenomenon of phishing emails leveraging QR codes \u2013 a technique define as \u201c<strong>Quishing<\/strong>\u201d &#8211; sheding light on the motivations behind this technique and sharing indicator of compromises (<strong>IOCs<\/strong>) and part of the data collected, to allow a better identification of these campaigns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-qr-codes\">QR Codes<\/h2>\n\n\n\n<p>QR codes, short for <strong>Quick Response<\/strong> codes, were originally designed to facilitate rapid data exchange. However, their convenience has not gone unnoticed by cybercriminals. These matrix barcodes can encode a variety of information, including <strong>website URLs<\/strong>.<\/p>\n\n\n\n<p>So, why are threat actors increasingly turning to QR codes in their phishing campaigns?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mobile Devices<\/h3>\n\n\n\n<p>One significant driver behind the growing adoption of QR code-enabled phishing lies in the user behavior it exploits. QR codes entice users to scan them with their mobile devices, and herein lies an inherent vulnerability. Unlike their desktop counterparts, mobile devices often <strong>lack the same level of security, protection, and user awareness<\/strong>. Moreover, mobile screens are smaller, making it harder for users to scrutinize URLs and discern phishing attempts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enhanced Cover-Up<\/h3>\n\n\n\n<p>QR codes provide an <strong>effective means of concealing malicious URLs<\/strong>. To the human eye, the QR code appears innocuous, making it harder for users to discern the true nature of the link. Users tend to be more casual and less cautious when using their smartphones, especially for personal tasks like scanning QR codes. This complacency is something threat actors exploit.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"765\" height=\"758\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/3_ok.png\" alt=\"\" class=\"wp-image-7113\" style=\"width:497px;height:492px\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/3_ok.png 765w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/3_ok-300x297.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/3_ok-150x150.png 150w\" sizes=\"(max-width: 765px) 100vw, 765px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Bypass Antispam engines<\/h3>\n\n\n\n<p>Quishing is a dangerous form of phishing because it is <strong>not recognized by most antispam filters<\/strong> or email security software. Antispam filters usually scan the text and attachments of the emails, but they do not analyze the content of the QR codes. Therefore, they cannot detect the malicious links hidden in the QR codes. Email security software may also fail to identify quishing emails as phishing, because they rely on indicators such as sender\u2019s address, subject line, or domain name, which can be easily spoofed by the threat actors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real Cases<\/h2>\n\n\n\n<p>Over the last few months Fortgale identified different campaigns leveraging Squishing as a way to perform cyberattacks. <\/p>\n\n\n\n<p>They all share the same tactics, mainly divided in three steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exploit<strong> psychological triggers<\/strong>, playing on the recipient&#8217;s curiosity, fear, or urgency to make the user to scan the QR Code, by inviting him to check a document or recover access to his account<\/li>\n\n\n\n<li>Redirect the user to a fake login page related to their account, usually created through a <strong>phishing kit<\/strong> like <a href=\"https:\/\/teams.microsoft.com\/l\/message\/19:5d97c137-2072-4443-b789-8a7816386ff4_f0861d79-7095-4df3-adbf-d57af9c3bbf1@unq.gbl.spaces\/1695373114196?context=%7B%22contextType%22%3A%22chat%22%7D\">evilginix<\/a><\/li>\n\n\n\n<li><strong>Exiltrate user credential<\/strong> to gain access to the user&#8217;s company systems<\/li>\n<\/ul>\n\n\n\n<p>Phishers often impersonate legitimate organizations, making use of sender addresses that appear genuine at first glance.<\/p>\n\n\n\n<p>In the following example, the attacker posed as the account manager of a real existent italian company.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"444\" height=\"530\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/1_ok.png\" alt=\"\" class=\"wp-image-7117\" style=\"width:326px;height:389px\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/1_ok.png 444w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/1_ok-251x300.png 251w\" sizes=\"(max-width: 444px) 100vw, 444px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<p>These phishing emails frequently revolve around topics like <strong>HR, payroll,<\/strong> or <strong>authentication<\/strong>.<\/p>\n\n\n\n<p>In the case below, for example, the theme is <strong>DocuSign<\/strong> and the victim is asked to review a document.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"801\" height=\"901\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6.png\" alt=\"\" class=\"wp-image-7115\" style=\"width:341px;height:383px\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6.png 801w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-267x300.png 267w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-768x864.png 768w\" sizes=\"(max-width: 801px) 100vw, 801px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<p>In these Quishing campaigns Sharepoint was used instead as theme, one related to <strong>Taxes payment<\/strong> and one to <strong>employee benefits<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"679\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/2-1024x679.png\" alt=\"\" class=\"wp-image-7112\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/2-1024x679.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/2-300x199.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/2-768x509.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/2.png 1201w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"573\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/8-1024x573.png\" alt=\"\" class=\"wp-image-7111\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/8-1024x573.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/8-300x168.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/8-768x429.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/8.png 1477w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>One of the primary risks involves the utilization of these campaigns for targeted attacks against <strong>C-Level<\/strong> individuals within companies, given their elevated permissions and access to <strong>sensitive information<\/strong>. In the following example, attackers meticulously replicated a security authentication message purportedly from Microsoft, prompting the user to scan a QR code for a purported security update review. The level of execution in this instance is higher than that of previous examples, demonstrating a <strong>tailored approach aimed at a specific target.<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"885\" height=\"714\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/7.png\" alt=\"\" class=\"wp-image-7119\" style=\"width:608px;height:491px\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/7.png 885w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/7-300x242.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/7-768x620.png 768w\" sizes=\"(max-width: 885px) 100vw, 885px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Conclusions<\/h2>\n\n\n\n<p><strong>Understanding these patterns<\/strong> and indicators is crucial for cybersecurity experts when developing <strong>proactive measures <\/strong>and educating users about the risks associated with QR code-enabled phishing attacks. In the ever-shifting landscape of cyber threats, staying <strong>informed <\/strong>and <strong>prepared<\/strong> is paramount to safeguarding both individuals and organizations from falling prey to these deceptive schemes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving landscape of cyber threats, threat actors are constantly seeking new and innovative ways to deceive and compromise unsuspecting targets. One of the latest techniques that Fortgale observed gaining prominence over the last few months is the utilization of QR codes in phishing email campaigns (Spearphishing Technique &#8211; T1566). In this article, we [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":7243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1497],"tags":[3068,2933,269,2931],"class_list":["post-6949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defence","tag-attention","tag-malware-campaigns","tag-phishing","tag-quishing"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/6949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=6949"}],"version-history":[{"count":27,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/6949\/revisions"}],"predecessor-version":[{"id":8180,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/6949\/revisions\/8180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media\/7243"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=6949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=6949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=6949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}