Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Posted on July 19, 2025July 19, 2025 By CWS

A classy phishing marketing campaign dubbed “Scanception” has emerged as a major risk to enterprise safety, leveraging QR codes embedded in PDF attachments to bypass conventional e mail safety measures and harvest consumer credentials.

The assault represents a regarding evolution in social engineering techniques, particularly concentrating on the rising reliance on cellular units for fast entry to digital assets by QR code scanning.

The marketing campaign operates by a multi-stage assault chain that begins with fastidiously crafted phishing emails containing PDF attachments designed to imitate official enterprise communications.

These paperwork, usually masquerading as HR handbooks or company bulletins, comprise professionally formatted content material full with authentic-looking logos and organizational branding to determine belief with potential victims.

Worker Handbook e mail lure (Supply – Cyble)

What makes this assault significantly insidious is its strategic placement of malicious QR codes on the ultimate pages of multi-page PDF paperwork, a method that successfully circumvents automated safety scanners which generally analyze solely the preliminary pages of attachments.

Cyble analysts recognized over 600 distinctive phishing PDFs related to this marketing campaign inside simply three months, with practically 80% displaying zero detections on VirusTotal on the time of study.

Decoy PDF doc (Supply – Cyble)

The technical sophistication of Scanception extends past easy QR code deployment.

Phishing QR code (Supply – Cyble)

As soon as victims scan the embedded codes, they’re redirected by a fancy community of official redirect providers together with YouTube, Google, Bing, and Cisco platforms, which masks the malicious intent behind trusted domains.

This abuse of respected infrastructure considerably reduces the probability of detection by reputation-based safety techniques.

Superior Evasion and Credential Harvesting Mechanisms

The phishing infrastructure demonstrates exceptional technical complexity in its evasion capabilities.

Upon reaching the faux Workplace 365 login portal, the malicious web site employs subtle detection mechanisms to determine automated evaluation instruments.

The location constantly displays for the presence of safety analysis instruments similar to Selenium, PhantomJS, or Burp Suite utilizing JavaScript capabilities that execute each 100 milliseconds.

When such instruments are detected, the system instantly redirects customers to “about:clean”, successfully terminating the assault chain and stopping additional evaluation.

The credential harvesting course of makes use of an Adversary-in-the-Center (AITM) strategy by a operate referred to as sendAndReceive(), which orchestrates real-time communication with attacker-controlled infrastructure.

Stolen credentials are exfiltrated through POST requests to dynamically generated endpoints created utilizing the randroute() operate mixed with the randexp.min.js library from GitHub, enabling randomized URL paths that cut back signature-based detection effectiveness.

The marketing campaign’s multi-factor authentication bypass functionality represents its most regarding side, because the infrastructure maintains an open communication channel to immediate victims for extra authentication knowledge together with 2FA tokens, e mail verification codes, and SMS-delivered one-time passwords.

This stepwise strategy permits full session hijacking and account takeover, permitting attackers to keep up long-term persistence inside compromised Microsoft 365 environments whereas efficiently bypassing trendy safety controls by real-time credential relay to official authentication providers.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attack, Code, Credentials, Detection, Evades, Harvest, PDFs, Systems

Post navigation

Previous Post: Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs
Next Post: New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

Related Posts

Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cyber Security News
Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Cyber Security News
Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Cyber Security News
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats Cyber Security News
BMW Allegedly Breached by Everest Ransomware Group, Internal Documents Reportedly Stolen BMW Allegedly Breached by Everest Ransomware Group, Internal Documents Reportedly Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News