Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Posted on July 19, 2025July 19, 2025 By CWS

A classy phishing marketing campaign dubbed “Scanception” has emerged as a major risk to enterprise safety, leveraging QR codes embedded in PDF attachments to bypass conventional e mail safety measures and harvest consumer credentials.

The assault represents a regarding evolution in social engineering techniques, particularly concentrating on the rising reliance on cellular units for fast entry to digital assets by QR code scanning.

The marketing campaign operates by a multi-stage assault chain that begins with fastidiously crafted phishing emails containing PDF attachments designed to imitate official enterprise communications.

These paperwork, usually masquerading as HR handbooks or company bulletins, comprise professionally formatted content material full with authentic-looking logos and organizational branding to determine belief with potential victims.

Worker Handbook e mail lure (Supply – Cyble)

What makes this assault significantly insidious is its strategic placement of malicious QR codes on the ultimate pages of multi-page PDF paperwork, a method that successfully circumvents automated safety scanners which generally analyze solely the preliminary pages of attachments.

Cyble analysts recognized over 600 distinctive phishing PDFs related to this marketing campaign inside simply three months, with practically 80% displaying zero detections on VirusTotal on the time of study.

Decoy PDF doc (Supply – Cyble)

The technical sophistication of Scanception extends past easy QR code deployment.

Phishing QR code (Supply – Cyble)

As soon as victims scan the embedded codes, they’re redirected by a fancy community of official redirect providers together with YouTube, Google, Bing, and Cisco platforms, which masks the malicious intent behind trusted domains.

This abuse of respected infrastructure considerably reduces the probability of detection by reputation-based safety techniques.

Superior Evasion and Credential Harvesting Mechanisms

The phishing infrastructure demonstrates exceptional technical complexity in its evasion capabilities.

Upon reaching the faux Workplace 365 login portal, the malicious web site employs subtle detection mechanisms to determine automated evaluation instruments.

The location constantly displays for the presence of safety analysis instruments similar to Selenium, PhantomJS, or Burp Suite utilizing JavaScript capabilities that execute each 100 milliseconds.

When such instruments are detected, the system instantly redirects customers to “about:clean”, successfully terminating the assault chain and stopping additional evaluation.

The credential harvesting course of makes use of an Adversary-in-the-Center (AITM) strategy by a operate referred to as sendAndReceive(), which orchestrates real-time communication with attacker-controlled infrastructure.

Stolen credentials are exfiltrated through POST requests to dynamically generated endpoints created utilizing the randroute() operate mixed with the randexp.min.js library from GitHub, enabling randomized URL paths that cut back signature-based detection effectiveness.

The marketing campaign’s multi-factor authentication bypass functionality represents its most regarding side, because the infrastructure maintains an open communication channel to immediate victims for extra authentication knowledge together with 2FA tokens, e mail verification codes, and SMS-delivered one-time passwords.

This stepwise strategy permits full session hijacking and account takeover, permitting attackers to keep up long-term persistence inside compromised Microsoft 365 environments whereas efficiently bypassing trendy safety controls by real-time credential relay to official authentication providers.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attack, Code, Credentials, Detection, Evades, Harvest, PDFs, Systems

Post navigation

Previous Post: Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs
Next Post: New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

Related Posts

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
Cost of a Breach Calculating ROI for Cybersecurity Investments Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials
  • Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
  • New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
  • New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
  • New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials
  • Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
  • New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
  • New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
  • New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News