Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information

Posted on August 21, 2025August 21, 2025 By CWS

Cybersecurity researchers have noticed a surge in phishing campaigns leveraging QR codes to ship malicious payloads.

This rising menace, usually dubbed “quishing,” exploits the opaque nature of QR codes to hide dangerous URLs that redirect victims to credential-harvesting websites or malware downloads.

Not like conventional phishing hyperlinks that may be flagged by e-mail gateways, QR codes require a visible scan by the top consumer—usually on a cellular gadget—circumventing desktop safety controls and increasing the attacker’s window of alternative.

The earliest situations appeared in generic mass-email blasts posing as routine account notifications from well-known service suppliers.

Nevertheless, attackers have quickly refined their techniques, tailoring messages to particular targets and embedding QR codes inside seemingly innocuous photographs.

In a single marketing campaign, a menace actor impersonated a number one cloud storage supplier, prompting recipients to “scan to confirm account exercise.”

Upon scanning, the QR code resolved to a pretend login portal meticulously crafted to reflect the reputable website’s HTML and JavaScript.

Barracuda analysts famous this preliminary wave of quishing assaults relied closely on social engineering reasonably than technical sophistication.

As defenders started to acknowledge and block easy QR code assaults, adversaries escalated their strategies.

Cut up QR codes emerged as a stealthier methodology, dividing a single code into two separate picture fragments that seem benign when seen independently.

Cut up QR Code Instance (Supply – Barracuda)

E-mail scanners inspecting picture attachments usually miss two partial photographs, but when rendered in an HTML e-mail they recombine visually right into a scannable QR sample. Victims who scan the composite code are redirected to websites designed to reap credentials or deploy secondary payloads.

Detection Evasion Via Nested QR Codes

Past splitting, the most recent quishing kits make use of nested QR codes to additional obfuscate malicious hyperlinks.

A nested code consists of an interior, benign QR pointing to a innocent URL (e.g., Google), surrounded by an outer code directing to a phishing area.

This dual-layer method generates ambiguous decoding outcomes: customary QR readers usually default to the interior code, whereas extra subtle decoders can extract the outer payload.

Attackers exploit this ambiguity to bypass QR evaluation instruments that lack the power to interpret a number of layers inside a single body.

Nested QR Code Instance (Supply – Barracuda)

For example, the next Python snippet makes use of the pyzbar library to decode layered QR photographs and spotlight each payloads:-

from PIL import Picture
from pyzbar.pyzbar import decode

img = Picture.open(‘nested_qr_code.png’)
outcomes = decode(img)
for res in outcomes:
print(f’Information: {res.information.decode()}, Kind: {res.sort}’)

Defenders should undertake multimodal AI options able to rendering photographs, isolating pixel patterns, and performing sandboxed hyperlink execution.

As organizations bolster spam filters and implement multi-factor authentication, attackers will undoubtedly proceed to innovate. Vigilance, layered defenses, and consumer coaching stay vital to counteract this evolving quishing menace.

Enhance your SOC and assist your group defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Codes, Embedded, Hackers, Information, Links, Malicious, Sensitive, Steal, Weaponize

Post navigation

Previous Post: Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
Next Post: Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth

Related Posts

Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information Cyber Security News
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware Cyber Security News
Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access Cyber Security News
Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System Cyber Security News
Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark