February 8, 2024 at 04:02PM
Email attacks using QR codes surged in Q4 2023, targeting corporate executives and managers. Phishing emails using QR codes, or “quishing,” bypass spam filters, and attackers focus on stealing credentials for privileged users. While quishing has subsided, it remains a threat, emphasizing the need for user training and technical controls to mitigate risks.
From the meeting notes, it is clear that there has been a surge in email attacks using QR codes, with cyber attackers specifically targeting corporate executives and managers. The attacks are seen to be escalating, with phishing emails using QR codes, also known as “quishing,” successfully getting past spam filters and landing in the email inboxes of users of Microsoft 365 and DocuSign.
The report by Abnormal Security highlights that top executives in the C-suite experienced a significant increase in QR-code-based phishing attacks, with attacks targeting their credentials and aiming to gain access to privileged information. The attackers are exploiting users’ trust in QR codes, including embedding them in everyday items and physical spaces, thus bypassing digital security measures. Credential phishing, in particular, is identified as the most popular form of email attack, and it often leads to more significant compromises.
However, there is some positive news as well, as the trend of QR-code phishing attacks has subsided to a large degree since October, with evidence suggesting that email filters are catching up to this technique. Nonetheless, it is emphasized that training and technical controls are essential to effectively deal with these threats, as even the most sophisticated filters may not catch every attack.
In summary, it is crucial for companies to place additional digital protections around their business leadership, including training employees to recognize and respond to phishing attacks, while also implementing technical controls to mitigate the risk of successful attacks.