Quishing on the Rise- An In-depth Look into QR Code Phishing
Phishing has evolved over the years, adopting numerous forms and approaches to deceive users into exposing sensitive information or downloading malicious software. I've witnessed a recent ongoing trend targeting various geographical regions, the use of QR codes in phishing emails. This tactic, termed "Quishing" (or "QR-phishing"), enables cybercriminals to employ QR codes cleverly, tricking users into accessing malicious links.
Upon investigating this phenomenon, an interesting revelation emerged, emails embedded with QR codes often bypass email gateways without scrutiny. This suggests that the typical safeguards, which examine URLs or attachments in emails, are essentially blind to the threats presented by these QR codes. Feedback from one of the top email gateway vendors has highlighted this security gap. They revealed that QR codes aren't usually analysed for content, meaning there's no current mechanism to classify the URLs within these codes regarding potential threats or identify them as Quishing.
In a typical "Quishing" scenario, users scan the QR code using a secondary device, most often a personal mobile phone. By prompting users to scan the QR code with a different device than the one where they received the email, cybercriminals ingeniously circumvent highly secure corporate systems. In many such instances, users utilise their personal mobiles to scan the code, consequently landing on malicious websites.
领英推荐
Numerous users perceive their personal devices as low-risk, often not securing them as thoroughly as they would a work-issued device. This perception renders personal devices an attractive, and frequently simpler, target for cybercriminals intending to trick users into accessing malicious links.
Prevention Measures: