Friday Phish Fry

Phishing Email Alerts

Catch of the Day: QR Code Phish
Examples of clever phish that made it past my anti-spam nets and into my inbox. Some are contributed by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at phish@wyzguys.com.

My intention is to provide a warning and show current examples of phishing scams, related articles, and education about how these scams and exploits work, and how to detect them in your inbox. If the pictures are too small or extend off the page, double clicking the image will display them in a photo viewer app.


QR Code Phishing is Still on the Rise – The SEG is Dead

Organizations need to be aware of the threat posed by QR code phishing (quishing), according to researchers at Trend Micro.

“Phishing emails continue to be the number one attack vector for organizations,” the researchers write.

“A QR code phishing, or quishing attack, is a modern social engineering cyber attack technique manipulating users into giving away personal and financial information or downloading malware. It targets C-level executives and the highest strategic roles within a company.”

Since QR codes don’t use a text-based link, they can slip past email security filters to target humans directly. Humans likewise can’t analyze the link itself before scanning the code.

The SEG is Dead

“Quishing can bypass traditional security email gateways, evading email filtering tools and identity authentication,” Trend Micro says. “This allows cyberattacks to move from a protected email to the user’s less secure mobile device, where cybercriminals can obtain confidential information, such as payment details, for fraudulent purposes.

“For instance, a malicious QR code hidden in a PDF or an image (JPEG/PNG) file attached to an email can bypass email security protection, such as filtering and flagging. This allows the email to be delivered directly to the user’s inbox without being analyzed for clickable content.”

Trend Micro says users should be on the lookout for the following red flags associated with QR codes:

  • “No context. Exercise caution if the QR code lacks context or appears out of place, such as QR codes randomly placed in a public area
  • Web links. Avoid sites accessed through QR codes that request payments. Instead, enter a known and trusted URL for transactions
  • Overlays. Be wary if the QR code is placed over existing signs or labels, as scammers may try to cover up legitimate information
  • Too much information: Be skeptical of QR codes that ask for excessive permissions (e.g., access to your camera, contacts, or location) beyond what is necessary”

Blog post with links and a free QR-code phishing test you can run:
https://blog.knowbe4.com/qr-code-phishing-is-still-on-the-rise

[BUDGET AMMO] “Email Threats Are Coasting Past SEGs, And CISOs Are Waking Up To It”:
https://www.forbes.com/sites/forbestechcouncil/2024/07/26/email-threats-are-coasting-past-segs-and-cisos-are-waking-up-to-it/

0

About the Author:

I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.