New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

A sophisticated phishing campaign dubbed “Scanception” has emerged as a significant threat to enterprise security, leveraging QR codes embedded in PDF attachments to bypass traditional email security measures and harvest user credentials. This stepwise approach enables complete session hijacking and account takeover, allowing attackers to maintain long-term persistence within compromised Microsoft 365 environments while successfully bypassing modern security controls through real-time credential relay to legitimate authentication services. What makes this attack particularly insidious is its strategic placement of malicious QR codes on the final pages of multi-page PDF documents, a technique that effectively circumvents automated security scanners which typically analyze only the initial pages of attachments. The campaign’s multi-factor authentication bypass capability represents its most concerning aspect, as the infrastructure maintains an open communication channel to prompt victims for additional authentication data including 2FA tokens, email verification codes, and SMS-delivered one-time passwords. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Once victims scan the embedded codes, they are redirected through a complex network of legitimate redirect services including YouTube, Google, Bing, and Cisco platforms, which masks the malicious intent behind trusted domains. The campaign operates through a multi-stage attack chain that begins with carefully crafted phishing emails containing PDF attachments designed to mimic legitimate business communications. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The site continuously monitors for the presence of security research tools such as Selenium, PhantomJS, or Burp Suite using JavaScript functions that execute every 100 milliseconds. Stolen credentials are exfiltrated via POST requests to dynamically generated endpoints created using the randroute() function combined with the randexp.min.js library from GitHub, enabling randomized URL paths that reduce signature-based detection effectiveness. Upon reaching the fake Office 365 login portal, the malicious website employs sophisticated detection mechanisms to identify automated analysis tools. The attack represents a concerning evolution in social engineering tactics, specifically targeting the growing reliance on mobile devices for quick access to digital resources through QR code scanning. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. These documents, often masquerading as HR handbooks or corporate announcements, contain professionally formatted content complete with authentic-looking logos and organizational branding to establish trust with potential victims. Cyble analysts identified over 600 unique phishing PDFs associated with this campaign within just three months, with nearly 80% showing zero detections on VirusTotal at the time of analysis.

This Cyber News was published on cybersecuritynews.com. Publication date: Sat, 19 Jul 2025 09:25:14 +0000


Cyber News related to New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
IT-Harvest Reaches Milestone With Ingestion of 10K Cybersecurity Products Into Dashboard - PRESS RELEASE. BIRMINGHAM, Mich., March 11, 2024/PRNewswire/ - IT-Harvest, the only provider of comprehensive cybersecurity industry data, is thrilled to announce a significant milestone in its journey. IT-Harvest's industry Dashboard, the company's ...
1 year ago Darkreading.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials - A sophisticated phishing campaign dubbed “Scanception” has emerged as a significant threat to enterprise security, leveraging QR codes embedded in PDF attachments to bypass traditional email security measures and harvest user credentials. ...
6 months ago Cybersecuritynews.com
Attackers Are Abusing Malicious PDFs: Here’s How to Spot Them Early - Malicious PDFs have become a prevalent attack vector for cybercriminals aiming to infiltrate systems and steal sensitive data. These seemingly harmless documents can harbor embedded malware, exploit vulnerabilities, or use social engineering tactics ...
4 months ago Cybersecuritynews.com CVE-2023-27532 CVE-2023-26360 Lazarus Group
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
9 months ago Cybersecuritynews.com
New PhantomCaptcha RAT Weaponized PDFs Targeting Users - A new cyber threat has emerged involving the PhantomCaptcha Remote Access Trojan (RAT) being distributed through weaponized PDF files. This attack vector leverages malicious PDFs to deliver the PhantomCaptcha RAT, which allows attackers to gain ...
3 months ago Cybersecuritynews.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
10 months ago Cybersecuritynews.com
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
9 months ago Cybersecuritynews.com
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
9 months ago Cybersecuritynews.com Hunters
A primer on storage anomaly detection - Anomaly detection plays an increasingly important role in data and storage management, as admins seek to improve security of systems. In response to these developments, more vendors incorporate storage anomaly detection capabilities into their ...
2 years ago Techtarget.com
Why It's More Important Than Ever to Align to The MITRE ATT&CK Framework - These missed attacks often stem from either hidden gaps in detection coverage - or due to alerts that got buried in a sea of noisy alerts and were never even pursued by the Security Operations Center team. In other words, we need to be able to report ...
2 years ago Cyberdefensemagazine.com APT28 FIN7 LAPSUS$ Lazarus Group
Best MDR (Managed Detection & Response) Solutions - 2025 - Cybereason Managed Detection and Response solutions provide 24/7 threat monitoring, advanced endpoint protection, and rapid incident response. Cynet MDR solutions provide automated threat detection and response, ensuring comprehensive security ...
10 months ago Cybersecuritynews.com
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
2 years ago Cyberdefensemagazine.com
Credentials are Still King: Leaked Credentials, Data Breaches and Dark Web Markets - Infostealers infect computers, steal all of the credentials saved in the browser along with active session cookies and other data, then export it back to command and control infrastructure before, in some cases, self-terminating. This article will ...
2 years ago Bleepingcomputer.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
2 years ago Securityboulevard.com
Improving Threat Detection: The Role Of MDR And XDR In Your Security Operations - MDR and XDR represent the next generation of threat detection and response, addressing the limitations of traditional security tools and enabling organizations to stay ahead of sophisticated adversaries. For organizations just beginning to mature ...
8 months ago Cybersecuritynews.com
New Phishing Attacks Abuses Webflow CDN & CAPTCHAs To Steal Credit Card Details - A recent phishing campaign has been uncovered by Netskope Threat Labs, highlighting a sophisticated technique where attackers exploit Webflow’s Content Delivery Network (CDN) and fake CAPTCHAs to steal sensitive financial information. This ...
11 months ago Cybersecuritynews.com
Building A Unified Security Strategy: Integrating Digital Forensics, XDR, And EDR For Maximum Protection - To effectively counter these threats, organizations must integrate Digital Forensics, Extended Detection and Response (XDR), and Endpoint Detection and Response (EDR) into a unified security framework. It involves two main components: digital ...
9 months ago Cybersecuritynews.com
New AI-Targeted Cloaking Attack Tricks Security Tools, Evades Detection - A new sophisticated AI-targeted cloaking attack has been discovered, which tricks security tools and evades detection. This advanced cyberattack leverages artificial intelligence to disguise malicious activities, making it challenging for traditional ...
2 months ago Thehackernews.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
8 months ago Cybersecuritynews.com Inception
IT and OT cybersecurity: A holistic approach - In comparison, OT refers to the specialized systems that control physical processes and industrial operations. OT Technologies include industrial control systems, SCADA systems and programmable logic controllers that directly control physical ...
2 years ago Securityintelligence.com
PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK - The Qosmos Threat Detection Software Development Kit is Enea's innovative solution to the demand for more robust, adaptable, and high-performance network threat detection platforms. ADVANCED THREAT DETECTION WITH SUPERIOR TRAFFIC VISIBILITY. ...
2 years ago Cybersecurity-insiders.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
3 years ago Bleepingcomputer.com