• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells From Above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > Defense > RSM Defense > Intel Insights – Phishing with QR Codes

Intel Insights – Phishing with QR Codes

August 25, 2023 By Joel Belton

A large phishing campaign using QR codes has been detected targeting various industries, with the aim to acquire Microsoft credentials. Researchers from the security firm, Cofense, observed the attacks against “a major Energy company based in the US.” The reported phishing campaign also targeted organizations in other industries, including finance, insurance, manufacturing, and tech. One targeting technique observed during the campaign was allowing emails containing a malicious QR code, using obfuscation tactics, coupled with hiding the URLs inside QR codes embedded into a PNG or PDF attachment to abuse trusted domains. Most of the phishing emails observed during the campaign, contained PNG image attachments delivering Microsoft credential phishing links or phishing redirects via an embedded QR code using the lure of updating account security surrounding general account security as well as 2FA and MFA.
Embedding the QR code also helps ensure the malicious emails bypass email security protections and makes it into potential victim inboxes. This is because it’s more difficult for spam filters to assess QR images included in an attachment. The fact that threat actors can hide malicious links inside QR codes or hide the codes within images, allows the malicious document to bypass email scanning solutions. This makes the QR code tactic practical in phishing campaigns. However, victims will still need to scan the malicious QR code with a QR code scanner on their mobile device, which provides victims the potential opportunity to observe and validate the URL before proceeding to open it. Most modern QR code scanners will show the URL attached to the QR code within the application prior to opening the page.

While QR codes do have legitimate reasons to be used, gaining popularity during the 2020 pandemic, malicious actors also have reasons to use them as well. With automation such as QR scanners and image recognition can be the first line of defense, it is not always guaranteed the QR code phishing activity will be picked up by technical solutions. Therefore, it is recommended that employees are instructed and trained not to scan QR codes in emails they receive as well as scanning QR codes in public without context of the QR code’s origin. Having employees and individuals, with access to business networks, remain vigilant and informed around this tactic will help mitigate the risk of exploit targeting accounts, networks, and businesses security architecture.

Sources: (1)(2)(3)

Joel Belton

Joel Belton is a military veteran with subject matter expertise in intelligence analysis involving strategic military exercise planning, satellite imagery and full motion video analytics, and actionable tactical operations for USSOCOM special operations. He graduated from Purdue University with a bachelor’s degree in electrical engineering technology with a discipline in radio frequency communication engineering. Joel’s passion for security is driven enhancing his skills in red team offensive security and blue team operations strategies in mitigating compromise.

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 11.1k views
  • Sophos UTM Home Edition – 3 – The Setup 10.9k views
  • Leveraging MS16-032 with PowerShell Empire 10.1k views
  • Bypassing Gmail’s Malicious Macro Signatures 10k views
  • How to Bypass SEP with Admin Access 9.1k views

Footer

  • Facebook
  • LinkedIn
  • Twitter
  • Tools
  • About
  • RSM US LLP

(312) 634-3400

30 S. Wacker Drive Suite 3300
Chicago, IL 60606

Copyright © 2026 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.