Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information

Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information

Posted on August 21, 2025August 21, 2025 By CWS

Cybersecurity researchers have noticed a surge in phishing campaigns leveraging QR codes to ship malicious payloads.

This rising menace, usually dubbed “quishing,” exploits the opaque nature of QR codes to hide dangerous URLs that redirect victims to credential-harvesting websites or malware downloads.

Not like conventional phishing hyperlinks that may be flagged by e-mail gateways, QR codes require a visible scan by the top consumer—usually on a cellular gadget—circumventing desktop safety controls and increasing the attacker’s window of alternative.

The earliest situations appeared in generic mass-email blasts posing as routine account notifications from well-known service suppliers.

Nevertheless, attackers have quickly refined their techniques, tailoring messages to particular targets and embedding QR codes inside seemingly innocuous photographs.

In a single marketing campaign, a menace actor impersonated a number one cloud storage supplier, prompting recipients to “scan to confirm account exercise.”

Upon scanning, the QR code resolved to a pretend login portal meticulously crafted to reflect the reputable website’s HTML and JavaScript.

Barracuda analysts famous this preliminary wave of quishing assaults relied closely on social engineering reasonably than technical sophistication.

As defenders started to acknowledge and block easy QR code assaults, adversaries escalated their strategies.

Cut up QR codes emerged as a stealthier methodology, dividing a single code into two separate picture fragments that seem benign when seen independently.

Cut up QR Code Instance (Supply – Barracuda)

E-mail scanners inspecting picture attachments usually miss two partial photographs, but when rendered in an HTML e-mail they recombine visually right into a scannable QR sample. Victims who scan the composite code are redirected to websites designed to reap credentials or deploy secondary payloads.

Detection Evasion Via Nested QR Codes

Past splitting, the most recent quishing kits make use of nested QR codes to additional obfuscate malicious hyperlinks.

A nested code consists of an interior, benign QR pointing to a innocent URL (e.g., Google), surrounded by an outer code directing to a phishing area.

This dual-layer method generates ambiguous decoding outcomes: customary QR readers usually default to the interior code, whereas extra subtle decoders can extract the outer payload.

Attackers exploit this ambiguity to bypass QR evaluation instruments that lack the power to interpret a number of layers inside a single body.

Nested QR Code Instance (Supply – Barracuda)

For example, the next Python snippet makes use of the pyzbar library to decode layered QR photographs and spotlight each payloads:-

from PIL import Picture
from pyzbar.pyzbar import decode

img = Picture.open(‘nested_qr_code.png’)
outcomes = decode(img)
for res in outcomes:
print(f’Information: {res.information.decode()}, Kind: {res.sort}’)

Defenders should undertake multimodal AI options able to rendering photographs, isolating pixel patterns, and performing sandboxed hyperlink execution.

As organizations bolster spam filters and implement multi-factor authentication, attackers will undoubtedly proceed to innovate. Vigilance, layered defenses, and consumer coaching stay vital to counteract this evolving quishing menace.

Enhance your SOC and assist your group defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Codes, Embedded, Hackers, Information, Links, Malicious, Sensitive, Steal, Weaponize

Post navigation

Previous Post: Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
Next Post: Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth

Related Posts

FreePBX SQL Injection Vulnerability Exploited to Modify The Database FreePBX SQL Injection Vulnerability Exploited to Modify The Database Cyber Security News
SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware Cyber Security News
APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials Cyber Security News
Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Cyber Security News
Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Cyber Security News
LeakNet Ramps Up Ransomware Attacks with New Techniques LeakNet Ramps Up Ransomware Attacks with New Techniques Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark