QR Code Quishing Attacks on Execs Surge, Evading Email Security

  /     /     /  
Publicated : 23/11/2024   Category : security


QR Code Quishing Attacks on Execs Surge, Evading Email Security


The use of QR codes to deliver malicious payloads jumped in Q4 2023, especially against executives, who saw 42 times more QR code phishing than the average employee.



Email attacks relying on QR codes surged in the last quarter, with attackers specifically targeting corporate executives and managers, reinforcing recommendations that companies place additional digital protections around their business leadership.
Making matters worse, phishing emails using QR codes (aka quishing) can often get by spam filters, with attacks targeting users of Microsoft 365 and DocuSign successfully landing in email inboxes, according to a report published this week by Abnormal Security, a provider of cloud email security.
In the fourth quarter of 2023, the average top executive in the C-suite saw 42 times more phishing attacks using QR codes compared to the average employee. Other managerial roles suffered an increase in attacks as well, although significantly smaller, with these non-C-suite executives encountering five times more QR-code-based phishing attacks, according to the companys report. 
Overall, the data demonstrates that attackers have executives — and other privileged users — in their sites, says Mike Britton, CISO for Abnormal Security.
If Im an attacker, I want to attack the people that have the ability for me to get paid and have credentials that give me access to the most interesting information, he says. Or I want to pretend to be those people, because once again, social engineering requires that trust, [for a victim to think,] hey, this VP of sales or this VP of HR is asking me to do something, [making them] typically more likely ... to take action.
While QR codes have been around for three decades, they became much more popular during the pandemic, as restaurants and other businesses directed customers to contact-free and online ordering. In a business context, a top use case for QR codes is offering links to ease the sign-up process for multifactor authentication (MFA). Cyberattackers have hopped on: More than a quarter of QR code attacks (27%) in Q4 were fake notices of MFA, for example, while about one-in-five attacks (21%) were fake notifications about a shared document,
according to Abnormal Securitys report
.
Because attackers hide their phishing link in an image, QR code phishing bypasses user suspicions and some email security products. In addition, malicious QR codes can be placed in physical spaces using a simple sticker, bypassing digital security altogether. 
Attacks exploit users inherent trust in QR codes, embedding them in everyday items like parking meters or posters, says Monique Becenti, director of product at mobile-security firm Zimperium. The success rate of phishing with QR codes will surpass traditional phishing methods because they often bypass users typical suspicion triggers, such as typos in the URL, leading to a higher likelihood of scanning them.
For the most part, quishing attackers who focus on executives are after the credentials — usernames and passwords — of privileged users. Credential phishing is the most popular form of email attack, accounting for 73% of all attacks through the vector and 84% of attacks using a QR code; and they often lead to more significant compromises, says Abnormal Securitys Britton. 
The primary goal is getting at a user to steal their credentials, he says. Once I have your credentials, I can do a lot more damage, and I can do a lot of lasting damage. If I have your credentials, I can log into your account, I can see who youve sent emails to, I can send emails pretending to be you, and I can create mail filter rules.
That last point is a common way to abuse mail credentials, Britton says. The attacker will create a blind carbon copy (BCC) rule that forwards all emails to the attackers account. 
Further, threat actors also recognize that often multiple people have access to an executives inbox, such as executive assistants, the report stated. Consequently, every individual who knows the login credentials for a VIPs inbox represents a potential entry point that can be exploited by an attacker.
The good news is, since October, QR-code phishing has subsided to a large degree, after accounting for 22% of phishing attacks,
according to human-risk management firm Hoxhunt
. Since last October, weve seen evidence that email filters are catching up to the QR phishing technique, says Jon Gellin, threat team lead at Hoxhunt. As fewer of these attacks are bypassing email filters, theres been a resultant decrease in their popularity.
However, even if quishing subsides, it will remain a tool for attackers, much in the way that shortened URLs and image spam continue to be used in cyberattacks. The best way to protect users is to train them, Gellin says. About 5% of users respond to a phishing attack within the first few minutes, suggesting that a well-trained pool of employees can help blunt an attack.
As the QR phishing trend has shown, some threats will always slip past even the most sophisticated filters, he says. At that point, its up to the human layer to have the skills and tools to deal with the threat effectively.
Training is important, but because a single failure can have a significant impact, technical controls are necessary, says Abnormal Securitys Britton.
There, there are some phishing attacks that Ive seen that even I have to get a second opinion from people because they look so real, he says. How do I expect an HR person to get that right every time? How do I expect an accounts payable person? How do I expect a financial analyst?
Training is important, but were going to fail, and it only takes one failure, he says.

Last News

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
QR Code Quishing Attacks on Execs Surge, Evading Email Security