Malicious QR Codes Drive Fivefold Spike in Phishing Emails

QR Codes

Kaspersky has detected a sharp increase in phishing emails containing malicious QR codes, rising from 46,969 incidents in August to 249,723 in November. This more than fivefold surge demonstrates how cybercriminals exploit QR codes as a cost-effective method to hide malicious URLs and evade traditional security solutions.

How Attackers Use QR Codes in Phishing

Attackers embed QR codes directly in email bodies or, more frequently, within PDF attachments. This technique masks phishing links and encourages users to scan the codes on mobile devices, which often have weaker security than corporate computers.

Common Malicious QR Code Scenarios

Malicious QR codes appear in both mass phishing campaigns and targeted attacks. Common examples include:

 

Risks to Organizations

These phishing campaigns exploit employees’ trust in routine business communications, potentially leading to credential theft, account takeovers, data breaches, and financial fraud.

Expert Commentary

“Malicious QR codes have become one of the most effective phishing tools, especially when hidden in PDFs or disguised as legitimate business updates. The November surge shows attackers are exploiting minimal mobile protections. Without advanced image analysis and safe scanning practices, organizations face severe risks,” explains Roman Dedenok, Anti-Spam Expert at Kaspersky.

Recommended Defensive Measures

To combat this growing threat, Kaspersky advises organizations to implement robust email security solutions such as Kaspersky Security for Mail Server. Such tools safeguard corporate email exchanges and protect against spam, phishing, QR code attacks, business email compromise (BEC), and other email-borne threats.

This approach strengthens organizational defenses against increasingly sophisticated phishing campaigns exploiting mobile vulnerabilities and QR code technology.

Exit mobile version