CyberCX Hack Report: Insights from a year of offensive security testing

QRishing guidance

Blogs from CyberCX

qr code

Published by Jed Laundry, Principal Consultant, Network and Infrastructure Solutions, 12 December 2023

A rise in attacks incorporating QR codes means it’s time to rethink how to protect ourselves from phishing emails online. 

 

What we’re seeing 

Over the past four months, CyberCX Security Operations Centres have been tracking a surge in phishing emails that ask victims to scan a QR code with their phones. These QR codes then direct users to phishing pages controlled by threat actors.  

Phishing lures are typically Microsoft branded, playing on how users were previously (legitimately) instructed by IT teams to setup Microsoft Authenticator by scanning a QR code with their phone. We have also observed more generic ‘login to view this document’ lures distributed in phishing campaigns using QR codes.

 

Figure 1: A typical flow from initial phishing message, to anti-sandbox evasion, to MFA-aware phishing page 

 

We have observed a particularly high rate of incidents resulting from recent campaigns using QR codes. These campaigns are particularly effective, because:

 

Recommendations

So, with a rise of phishing attacks incorporating QR code technology, how can end users and individuals best protect themselves and stay ahead of the attackers? Here are some simple steps that can help.

 

Educate your users

If you have a user awareness training platform that sends simulated phishing emails, incorporate QR codes and use it. Platforms commonly have templates with QR codes, and QR codes can otherwise be created reasonably quickly. We recommend using updated templates in simulations and advising users of the trend towards QR code use in phishing.

User education isn’t going to be 100% effective in preventing compromise, but showing users what to look out for based on trends in threat actor behaviour can certainly increase the chances of detecting and disrupting an intrusion.

 

Check your Settings

Security vendors are aware of the ongoing campaigns, and some either already have or are in the process of adding QR code detection to their products. For you to get the benefit of this protection, you need to ensure your spam filter settings are in line with your vendor’s best practice recommendations.

For Microsoft E5 and Defender for Office 365, this means ensuring that your domains are configured with either the Standard or Strict preset security policies. Customers who have implemented Defender for Office 365 should review their settings, and if they haven’t already migrated to preset security policies, should do so now to take advantage of more modern capabilities.

 

Plan for Passwordless

While MFA is still highly recommended and is a very effective security tool for reducing credential stuffing attacks, the rise of MFA-aware phishing kits means that the overall effectiveness of push- or code-based MFA is reducing.

The next step is for organisations to move towards Passwordless solutions, where the user simply doesn’t have a password that can be phished.

Most organisations have already deployed Windows Hello across their environment, which greatly increases overall security and user satisfaction. We strongly recommend organisations start planning now on how to implement Passwordless authentication. For more information, see our previous blog Get ready to kiss passwords goodbye.

 

Reduce the blast radius

Finally, there will never be perfect security – we can manage residual risk by increasing the speed at which we can detect and disrupt an attack, and by decreasing the speed that a threat actor can achieve their goals.

Particularly damaging is when a threat actor compromises a user with administrative privileges. Many organisations have already taken steps to separate user and administrative accounts, and as part of developing a Passwordless strategy, organisations should consider how they further protect administrative accounts.

 

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.