Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information

Posted on August 21, 2025August 21, 2025 By CWS

Cybersecurity researchers have noticed a surge in phishing campaigns leveraging QR codes to ship malicious payloads.

This rising menace, usually dubbed “quishing,” exploits the opaque nature of QR codes to hide dangerous URLs that redirect victims to credential-harvesting websites or malware downloads.

Not like conventional phishing hyperlinks that may be flagged by e-mail gateways, QR codes require a visible scan by the top consumer—usually on a cellular gadget—circumventing desktop safety controls and increasing the attacker’s window of alternative.

The earliest situations appeared in generic mass-email blasts posing as routine account notifications from well-known service suppliers.

Nevertheless, attackers have quickly refined their techniques, tailoring messages to particular targets and embedding QR codes inside seemingly innocuous photographs.

In a single marketing campaign, a menace actor impersonated a number one cloud storage supplier, prompting recipients to “scan to confirm account exercise.”

Upon scanning, the QR code resolved to a pretend login portal meticulously crafted to reflect the reputable website’s HTML and JavaScript.

Barracuda analysts famous this preliminary wave of quishing assaults relied closely on social engineering reasonably than technical sophistication.

As defenders started to acknowledge and block easy QR code assaults, adversaries escalated their strategies.

Cut up QR codes emerged as a stealthier methodology, dividing a single code into two separate picture fragments that seem benign when seen independently.

Cut up QR Code Instance (Supply – Barracuda)

E-mail scanners inspecting picture attachments usually miss two partial photographs, but when rendered in an HTML e-mail they recombine visually right into a scannable QR sample. Victims who scan the composite code are redirected to websites designed to reap credentials or deploy secondary payloads.

Detection Evasion Via Nested QR Codes

Past splitting, the most recent quishing kits make use of nested QR codes to additional obfuscate malicious hyperlinks.

A nested code consists of an interior, benign QR pointing to a innocent URL (e.g., Google), surrounded by an outer code directing to a phishing area.

This dual-layer method generates ambiguous decoding outcomes: customary QR readers usually default to the interior code, whereas extra subtle decoders can extract the outer payload.

Attackers exploit this ambiguity to bypass QR evaluation instruments that lack the power to interpret a number of layers inside a single body.

Nested QR Code Instance (Supply – Barracuda)

For example, the next Python snippet makes use of the pyzbar library to decode layered QR photographs and spotlight each payloads:-

from PIL import Picture
from pyzbar.pyzbar import decode

img = Picture.open(‘nested_qr_code.png’)
outcomes = decode(img)
for res in outcomes:
print(f’Information: {res.information.decode()}, Kind: {res.sort}’)

Defenders should undertake multimodal AI options able to rendering photographs, isolating pixel patterns, and performing sandboxed hyperlink execution.

As organizations bolster spam filters and implement multi-factor authentication, attackers will undoubtedly proceed to innovate. Vigilance, layered defenses, and consumer coaching stay vital to counteract this evolving quishing menace.

Enhance your SOC and assist your group defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Codes, Embedded, Hackers, Information, Links, Malicious, Sensitive, Steal, Weaponize

Post navigation

Previous Post: Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
Next Post: Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth

Related Posts

Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome Cyber Security News
Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques Cyber Security News
Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User Cyber Security News
LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly Cyber Security News
Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
  • Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
  • Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth
  • Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information
  • Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
  • Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
  • Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth
  • Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information
  • Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News