QR Code Phishing Attacks Target High-Level Executives: Report

C-level executives and others in managerial positions are by far the top targets of increasingly popular phishing attacks that involve malicious QR codes.
Bad actors know that if they can get into the email of a highly placed executive, it opens up all sorts of pathways to a company's systems and data, Callie Hinman Baron, content marketing manager for the email security vendor, wrote in a blog post this week.
If a hacker can compromise an executive's account, they can send fake requests to people inside and outside of the company who will see the name of the executive sending the email and likely open it and complete the request without question.
The focus on quishing and executives are part of Abnormal Security's H1 2024 Email Threat Report.
In quishing campaigns, hackers often will email their malicious QR code that links to what seems like a legitimate website that often look like a Microsoft or Google login page, complete with a prompt to enter login credentials or similar sensitive information.
The attacker can then use the information to compromise the email account and launch more attacks.
QR codes have been around since the early 1990s and threat groups have been using fraudulent QR codes in their scams for several years.
The use of QR codes picked up steam during the COVID-19 pandemic, with businesses using them for such everything from restaurant menus to contactless payments systems in hopes of slowing the spread of the virus, which increased the comfort among people for using them.
They also know that using QR codes may help them slip past the messages employees constantly hear in cybersecurity awareness training to avoid clicking on links in emails they weren't expecting to receive.
Replacing hyperlinks in phishing attacks with QR codes makes it more likely the phishing message will get past legacy email security solutions, in large part because the emails contain minimal content and no obvious URL, so the number of signals that the security tools typically pick out and analyze to detect an attack aren't there.
In a report late last year, SlashNext researchers noted that security experts had seen a 50% jump in QR code-based phishing attempts in the previous months.
The FBI said in an advisory last year that it had begun seeing more reports of people who were victimized by fraudulent QR code-based attacks.
Cybersecurity firm Hoxhunt in October 2023 reported that QR codes were used in 22% of the phishing campaigns it detected in the first weeks of the month.
Abnormal researchers found that 89.3% of QR code attacks they detect are aiming to steal credentials, such as usernames and passwords.
One, which accounted for about 27% of all quishing attacks, used fake notices related to multifactor authentication.
The other - in about 21% of attacks - involved sending fraudulent notifications of a shared document.
In the report, Abnormal showed common ways such attacks occurred using Microsoft and DocuSign as lures.
Construction and engineering firm and professional service provides were the most popular targets of quishing campaigns, up to 19.2 and 18.5 times, respectively, more likely to see such attacks than organizations in other industries.
Getting into the accounts of professional service providers means access to confidential information that can be sold, ransomed, or use in other attacks, the report's authors wrote.
Abnormal also found that smaller companies - those with 500 or fewer mailboxes - experience 19 times more quishing attacks than others.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 09 Feb 2024 17:43:06 +0000


Cyber News related to QR Code Phishing Attacks Target High-Level Executives: Report

What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
1 year ago Trendmicro.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
10 months ago Techrepublic.com
How CISOs Can Secure High-Level Executives: Keys to Consider - Securing high-level executives is a difficult task for CISOs for a number of reasons. Executives often have access to a large amount of sensitive data and play a critical role in an organization’s success, so protecting them from cyber threats is ...
1 year ago Csoonline.com
QR Code 'Quishing' Attacks on Execs Surge, Evading Email Security - Email attacks relying on QR codes surged in the last quarter, with attackers specifically targeting corporate executives and managers, reinforcing recommendations that companies place additional digital protections around their business leadership. ...
10 months ago Darkreading.com
Flipping the BEC funnel: Phishing in the age of GenAI - For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic email and fire it out to thousands of recipients in the hope that a few might take the bait. Common among these new techniques was a shift towards ...
11 months ago Helpnetsecurity.com
QR Code Phishing Attacks Target High-Level Executives: Report - C-level executives and others in managerial positions are by far the top targets of increasingly popular phishing attacks that involve malicious QR codes. Bad actors know that if they can get into the email of a highly placed executive, it opens up ...
10 months ago Securityboulevard.com
It all adds up: Pretexting in executive compromise - If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords. While ...
5 months ago Securityintelligence.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
10 months ago Gbhackers.com
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
7 months ago Hackread.com
Surge of swatting attacks targets corporate executives and board members - At around 8:45 pm on February 1, 2023, a caller to the Groveland, Massachusetts, 911 emergency line told dispatchers that he harmed someone in a home on Marjorie Street in the upscale small town 34 miles north of Boston. The caller also said he would ...
1 year ago Csoonline.com
Phishing Campaign Exploits Open Redirection Vulnerability In 'Indeed.com' - Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around the world every day. Owing to the prevalence of the problem, Verizon's 2023 Data Breach ...
9 months ago Cyberdefensemagazine.com
Vade Releases 2023 Phishers' Favorites Report - PRESS RELEASE. SAN FRANCISCO, Feb. 15, 2024 /PRNewswire/ - Vade, a global leader in threat detection and response with more than 1.4 billion mailboxes protected, today announced its annual Phishers' Favorites report for 2023. Phishers' Favorites ...
10 months ago Darkreading.com
Bolster an Organizational Cybersecurity Strategy with External Data Privacy - Their external data, when collected from any number of shopping, social or messaging sites are so integrated in our lives; they can be the all-access pass into the company system. Data privacy at the C-Suite level is critical in today's ...
11 months ago Cyberdefensemagazine.com
Data security and cost are key cloud adoption challenges for financial industry - 91% of banks and insurance companies have now initiated their cloud journey, a significant increase from 2020, when only 37% of firms had embarked on their cloud transformations, according to Capgemini. This high rate and its corresponding investment ...
11 months ago Helpnetsecurity.com
One Phish, Two Phish, Red Phish, Blue Phish - I sat down for a chat with George Skouroupathis, our phishing expert at Resonance Security. Phishing is often the first step taken by hackers in a larger scam. There are lots of different kinds of phishing attacks, but one of the most prevalent is ...
6 months ago Hackread.com
Telegram is a Wide-Open Marketplace for Phishing Tools - The encrypted messaging app Telegram has become a veritable marketplace for bad actors who want to launch effective phishing campaigns on the cheap, essentially democratizing the cyberthreat, according to researchers at cybersecurity firm Guardio. ...
10 months ago Securityboulevard.com
"Quishing" you a Happy Holiday Season - QR Code phishing scams - What they are and how to avoid them. Originally invented to keep track of car parts in the early 90s, QR codes have been around for decades. Quishing, or QR Code phishing, exploits smartphone users scanning the 2D barcode, ...
1 year ago Netcraft.com
NCSC says AI will increase ransomware, cyberthreats - While ransomware activity is already surging, a new National Cyber Security Centre report assessed that the threat will only increase globally over the next year as AI improves phishing and other threat actor techniques. The report is based on an ...
10 months ago Techtarget.com
Police takes down BulletProftLink large-scale phishing provider - The notorious BulletProftLink phishing-as-a-service platform that provided more than 300 phishing templates has been seized, the Royal Malaysian Police announced. The operation started in 2015 but came to researchers' radar later and became more ...
1 year ago Bleepingcomputer.com
Google Cloud Report Spotlights 2024 Cybersecurity Challenges - As the New Year dawns, a cybersecurity report from Google Cloud suggests that while there are many challenges ahead, it will also become simpler for cybersecurity teams to leverage artificial intelligence to better defend IT environments. John ...
11 months ago Securityboulevard.com
New phishing attack steals your Instagram backup codes to bypass 2FA - A new phishing campaign pretending to be a 'copyright infringement' email attempts to steal the backup codes of Instagram users, allowing hackers to bypass the two-factor authentication configured on the account. Two-factor authentication is a ...
1 year ago Bleepingcomputer.com
USPS Delivery Phishing Scam Exploits SaaS Providers to Steal Data - A new USPS Delivery Phishing Scam has surfaced, in which scammers are exploiting Freemium Dynamic DNS and SaaS Providers to steal victims' login credentials and other data. Cybersecurity researchers at Bloster AI have uncovered a new USPS Delivery ...
1 year ago Hackread.com
Splunk: AI isn't making spear phishing more effective - Despite increased concerns, AI tools won't give adversaries an advantage when it comes to sending effective phishing emails, according to new research by Splunk's Surge security research team. In a blog post Thursday, Tamara Chacon, security ...
1 year ago Techtarget.com
China-Sponsored Attackers Target 40K Corporate Users in 90 Days - Three novel credential-phishing campaigns have emerged from state-sponsored actors that have compromised at least 40,000 corporate users - including top-level executives - in just three months' time, researchers have found. The attacks target a range ...
5 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)