Sunday, November 17, 2024
HomeCyber Security NewsHuge Surge in Hackers Exploiting QR code for Phishing Attacks

Huge Surge in Hackers Exploiting QR code for Phishing Attacks

Published on

Phishing has been one of the primary methods threat actors use for impersonating individuals or brands with a sense of urgency that could result in private information being entered on a malicious URL.

Phishing has been set with several preventive measures that block any phishing email inside an organization.

However, with evolving technologies, threat actors have equipped themselves with the right tools that can help them evade any preventive mechanisms and prevent any individuals from giving up their confidential information. One of the latest techniques used by threat actors is Quishing or QR-based phishing. 

- Advertisement - SIEM as a Service
Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

QR-based Phishing Surges

There has been a big surge in Quishing attacks due to the evasion technique it offers and the success ratio. QRs have boomed in the last three years and are now used in several places, such as MFA, for viewing menus at restaurants, Wi-Fi password scanning, contactless payments, and several other purposes.

This makes QRs more dangerous than usual, as victims have low suspicions of malicious QR codes that can steal confidential information from the victim. Quishing is another important factor that makes it one of the biggest weapons in a threat actor’s arsenal.

When a user receives an email with a malicious QR, he/she scans the QR using their mobile phone, which brings them out of the organization’s security circle since no organization monitors personal mobile phones.

Scanning a malicious QR takes them to a malicious website that impersonates a Microsoft or Google login page, prompting them to enter their credential.

Since QRs have low suspicions among executives, users enter their credentials that provide the threat actor with a valid credential to an organization.

Malicious Quishing email (Source: Abnormal Security)
Malicious Quishing email (Source: Abnormal Security)

C-Suite Targeted High

Though any employee could be a target of a Quishing attack, researchers revealed that C-suite members such as chief executive officer (CEO), Chief financial officer (CFO), Chief operating officer (COO), and Chief information officer (CIO) were highly targeted due to the level of privilege and access they possess.

Quishing Attack ratio (Source: Abnormal Security)
Quishing Attack ratio (Source: Abnormal Security)

Non-C-Suite VIPs, such as executive vice presidents, senior vice presidents, and department heads, were also heavily targeted with Quishing attacks.

Suppose threat actors gain access to one of these high-level credentials. In that case, they can initiate an internal as well as an external fraudulent request that could target many employees inside an organization.

QR-based phishing attacks have been published by Abnormal Security, which provides detailed information about the attack vector, credential compromise, percentage ratio of targets, and other information.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...