ASCII art in phishing emails | Kaspersky official blog
Cybercriminals using ASCII art to create pseudographics QR codes with embedded phishing links.
AI Analysis
Technical Summary
This threat involves phishing emails that embed QR codes constructed from ASCII or Unicode characters (ASCII art) rather than as images. Attackers use this method to evade link scanning and image analysis tools that detect malicious URLs embedded in traditional QR code images. The phishing emails often impersonate legitimate services (e.g., DocuSign) and prompt recipients to scan the ASCII art QR code to visit a malicious website and enter corporate credentials. This technique revives an old form of text-based graphics to circumvent modern security controls designed to detect image-based phishing content.
Potential Impact
The impact is primarily the risk of credential theft through phishing. Victims who scan the ASCII art QR code may be directed to malicious websites designed to harvest login credentials or other sensitive information. This method attempts to bypass automated security filters, increasing the likelihood that phishing emails reach end users. However, no direct exploitation of software vulnerabilities is involved, and no known exploits in the wild have been reported.
Mitigation Recommendations
Kaspersky’s secure email gateway includes technology to detect and block ASCII art-based QR code phishing attempts. Organizations should deploy advanced anti-phishing email gateways capable of analyzing both images and text-based QR codes. Endpoint security solutions should be installed on all devices accessing email and the internet. Regular security awareness training is recommended to educate users about modern phishing tactics, including the risks associated with QR codes in emails and the use of ASCII art as a phishing indicator. There is no indication that additional patches or fixes are required.
ASCII art in phishing emails | Kaspersky official blog
Description
Cybercriminals using ASCII art to create pseudographics QR codes with embedded phishing links.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves phishing emails that embed QR codes constructed from ASCII or Unicode characters (ASCII art) rather than as images. Attackers use this method to evade link scanning and image analysis tools that detect malicious URLs embedded in traditional QR code images. The phishing emails often impersonate legitimate services (e.g., DocuSign) and prompt recipients to scan the ASCII art QR code to visit a malicious website and enter corporate credentials. This technique revives an old form of text-based graphics to circumvent modern security controls designed to detect image-based phishing content.
Potential Impact
The impact is primarily the risk of credential theft through phishing. Victims who scan the ASCII art QR code may be directed to malicious websites designed to harvest login credentials or other sensitive information. This method attempts to bypass automated security filters, increasing the likelihood that phishing emails reach end users. However, no direct exploitation of software vulnerabilities is involved, and no known exploits in the wild have been reported.
Mitigation Recommendations
Kaspersky’s secure email gateway includes technology to detect and block ASCII art-based QR code phishing attempts. Organizations should deploy advanced anti-phishing email gateways capable of analyzing both images and text-based QR codes. Endpoint security solutions should be installed on all devices accessing email and the internet. Regular security awareness training is recommended to educate users about modern phishing tactics, including the risks associated with QR codes in emails and the use of ASCII art as a phishing indicator. There is no indication that additional patches or fixes are required.
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/ascii-qr-phishing/55789/","fetched":true,"fetchedAt":"2026-05-21T05:03:45.915Z","wordCount":1206}
Threat ID: 6a0e9231ba1db473621d38dd
Added to database: 5/21/2026, 5:03:45 AM
Last enriched: 5/21/2026, 5:03:53 AM
Last updated: 5/21/2026, 3:34:22 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.