QR Code Scammers are Changing Tactics to Evade Detection

Check Point researchers last year saw a 587% increase between August and September of phishing attacks enticing unsuspecting targets to click on QR codes that then redirect them to malicious pages used for harvesting credentials.
The cybersecurity firm's report was one of several last year that talked about a rapid rise in such QR code-focused phishing - or quishing - campaigns.
The nonprofit National Cybersecurity Center in January 2023 warned that QR scams were growing as the popularity of QR codes expanded over the past few years.
The organization noted that attackers are using everything from parking meters to cyptocurrency wallets to romance scams to convince people to click on malicious QR codes.
Hoxhunt and SlashNext also wrote about the rise in the number of attacks and variations of the malicious uses of QR codes.
Fueling the growing use of QR codes - and thus scams using them - include the continued rise in the use to mobile devices, the widespread use by businesses of QR codes during the pandemic, and how easy it is to use the codes.
In response to the sharp rise in quishing attacks last year, cybersecurity vendors pushed out new tools for organizations and individuals to protect themselves.
Scammers in turn are adapting their attacks to get around such protections and increase the likelihood that more people will click on their QR codes.
Over a two-week period this month, Check Point 20,000 attacks that use an slightly different method, Fuchs wrote.
Like the attacks detected last year, the goal was to use lures in emails to get users to scan the attacker's QR code, which would then redirect the user to a page used to harvest the victim's credentials.
According to the research by Harmony Email and Collaboration, a unit within Check Point, scammers are running business email compromise campaigns and social engineering techniques in emails sent to targets.
It starts like most quishing attacks, sending an email to potential victims asking them to look at an annual 401K contribution statement by scanning the QR code, promising it will give the victim their account balance for the year.
The link in the emails are the same, but the QR code has a conditional destination point that is based on characteristics of the technology the victim is using, including browser, device, screen size, and software.
Based the information, the QR code will direct the user to particular pages.
The domain will automatically check to see if the user's device is using a browser or scanning engine and accordingly will redirect to a particular page.
One embeds the QR code in a PDF attached to the email and will lead the victim to a fake Microsoft login page.
Redirection in quishing campaigns - as well as other kinds of attacks - isn't new, but with the conditional redirection, the hackers can grow their chances of succeeding because default layers of security typically will look at a redirection and let it go if it's clean.
The key is having a cybersecurity solution that looks at multiple layers, he wrote.
An email security solution can block an attack by detecting suspicious behavior like the email coming from a first-time send and analyzing the text.
Browser security tools will inspect the website and block it if necessary, mobile security will block the attack if the QR code is scanned, and anti-malware software will emulate the file to determine what will happen.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 26 Jan 2024 15:13:06 +0000


Cyber News related to QR Code Scammers are Changing Tactics to Evade Detection

Fraudsters Successfully Inserted Cryptocurrency Programs into Apple and Google's App Stores - Scammers were able to get two malicious apps onto the app stores of both Google and Apple, allowing them to trick users into investing in fake cryptocurrency. According to a report from Sophos, the apps, Ace Pro and MBM BitScan, were found on both ...
2 years ago Therecord.media
Most scammed items for this Christmas season - As the festive season is just a couple of days ahead, the joy of giving and receiving is accompanied by an unfortunate increase in scams targeting unsuspecting holiday shoppers. Scammers are adept at exploiting the spirit of generosity and the rush ...
1 year ago Cybersecurity-insiders.com
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
1 year ago Securityboulevard.com
Spotting Phishing Attacks with Image Verification Techniques - Phishing refers to the tactic used by scammers who impersonate reputable brands and lure victims to click on suspicious links so that they can breach the privacy and sensitive data of individuals. You can call image-based phishing a relatively ...
18 hours ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
1 week ago Cybersecuritynews.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
3 weeks ago Cybersecuritynews.com
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
1 week ago Cybersecuritynews.com
Best MDR (Managed Detection & Response) Solutions - 2025 - Cybereason Managed Detection and Response solutions provide 24/7 threat monitoring, advanced endpoint protection, and rapid incident response. Cynet MDR solutions provide automated threat detection and response, ensuring comprehensive security ...
3 weeks ago Cybersecuritynews.com
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets - Unit 42 researchers have observed threat actors using malicious JavaScript samples to steal sensitive information by abusing popular survey sites, low-quality hosting and web chat APIs. In this article, we'll describe some of the tactics used by ...
1 year ago Unit42.paloaltonetworks.com
A primer on storage anomaly detection - Anomaly detection plays an increasingly important role in data and storage management, as admins seek to improve security of systems. In response to these developments, more vendors incorporate storage anomaly detection capabilities into their ...
1 year ago Techtarget.com
Latest Information Security and Hacking Incidents - Vishing, short for voice phishing, involves scammers attempting to trick people into revealing sensitive information over the phone. These calls often impersonate authorities like the IRS or banks, creating urgency to manipulate victims. Vishing ...
1 year ago Cysecurity.news
Massive utility scam campaign spreads via online ads - When customers want to discuss their bills or look for ways to save money, scammers are just a phone call away. Enter the utility scam, where crooks pretend to be your utility company so they can threaten and extort as much money from you as they ...
1 year ago Malwarebytes.com
Why It's More Important Than Ever to Align to The MITRE ATT&CK Framework - These missed attacks often stem from either hidden gaps in detection coverage - or due to alerts that got buried in a sea of noisy alerts and were never even pursued by the Security Operations Center team. In other words, we need to be able to report ...
1 year ago Cyberdefensemagazine.com APT28 FIN7 LAPSUS$ Lazarus Group
Fraudulent "CryptoRom" Apps Slip Through Apple and Google App Store Review Process - Pig Butchering, also known as Sha Zhu Pan and CryptoRom, is an ugly name for an ugly scam. What is new is that apps perpetrating the scam can be downloaded from the official Apple and Android app stores - giving them greater apparent validity to ...
2 years ago Securityweek.com
Building Your Defense Toolbox: Tools and Tactics to Combat Cyber Threats - The emergence of AI-powered malicious chatbots, such as WormGPT and FraudGPT, has enabled malicious threat actors to not only refine their skills but also consolidate all their malicious activities and tools into one, like a toolbox. Understanding ...
1 year ago Hackread.com
MacOS info-stealers quickly evolve to evade XProtect detection - Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently. A report by SentinelOne highlights the problem through three ...
1 year ago Bleepingcomputer.com
PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK - The Qosmos Threat Detection Software Development Kit is Enea's innovative solution to the demand for more robust, adaptable, and high-performance network threat detection platforms. ADVANCED THREAT DETECTION WITH SUPERIOR TRAFFIC VISIBILITY. ...
1 year ago Cybersecurity-insiders.com
Avast Threat Report shows humans are better targets that software - The latest Avast Threat Report identifies the most prominent targets for cybercrime-and it's us. While that has some slight relationship to the real world, Avast Threat Labs' latest findings show that online fraudsters aren't focusing as much on ...
1 year ago Blog.avast.com
QR Code Scammers are Changing Tactics to Evade Detection - Check Point researchers last year saw a 587% increase between August and September of phishing attacks enticing unsuspecting targets to click on QR codes that then redirect them to malicious pages used for harvesting credentials. The cybersecurity ...
1 year ago Securityboulevard.com
New Phishing Scam Hooks META Businesses with Trademark Threats - The phishing scam falsely asserts that the victim's Facebook page will be permanently deleted due to a post allegedly infringing on trademark rights. There is no actual infringement; it's all part of the scammer's malicious plan. In a recent wave of ...
1 year ago Hackread.com
Social media influencers targeted by identity thieves - Social media influencers are attractive targets for identity thieves. With large followings and a literal influence on their followers, it's no wonder they are targeted by scammers and spreaders of fake news. Such a person influences the financial ...
1 year ago Malwarebytes.com
How Criminals Are Leveraging AI to Create Convincing Scams - Cybercriminals create far more sophisticated scams with generative AI than traditional phishing scams. According to Visa research, scammers are fooling even the savviest internet users by launching pig butchering, inheritance, humanitarian relief ...
10 months ago Tripwire.com
Hackers employ nuanced tactics to evade detection - Threat actors evolved tactics, opting for a more nuanced approach that spread attacks across a broader timeframe to blend in with legitimate traffic and evade detection during peak holiday shopping times, according to Cequence Security. The months ...
1 year ago Helpnetsecurity.com
Sophisticated macOS Infostealers Get Past Apple's Built-In Detection - Increasingly sophisticated infostealers are targeting macOS with the capability to evade Apple's built-in malware protection, as attackers are becoming more savvy about how to crack static signature-detection engines like the platform's proprietary ...
1 year ago Darkreading.com Hunters

Latest Cyber News


Cyber Trends (last 7 days)