Phishing on the Edge of the Web and Mobile Using QR Codes
This article explores the misuse of QR codes in phishing attacks, focusing on three key areas: QR codes with URL shorteners concealing malicious destinations, in-app deep links used to steal credentials and control victims' apps, and QR codes bypassing app store security via direct malicious app downloads. The research reveals an average of 11,000 daily detections of malicious QR codes, with financial services being the most targeted industry. Attackers are leveraging QR code shorteners, in-app deep links, and direct downloads to evade security controls and exploit users' trust in QR codes. The article highlights specific attack scenarios, including account takeovers through messaging apps and distribution of suspicious gambling apps.
AI Analysis
Technical Summary
The analyzed threat centers on the exploitation of QR codes as vectors for phishing and malware distribution on web and mobile platforms. Attackers use URL shorteners embedded in QR codes to obscure malicious URLs, making it difficult for users and security tools to detect the true destination. In-app deep links are leveraged to initiate credential theft and gain control over victim applications, enabling account takeovers and unauthorized actions within apps. Additionally, QR codes are used to bypass traditional app store vetting by directly linking to malicious APK files, such as nagapocker.apk and ludashi_home.apk, facilitating the installation of malware outside official channels. The research highlights an average of 11,000 daily detections of such malicious QR codes, with financial services being the most heavily targeted sector due to the high value of credentials and accounts. Attack scenarios include phishing via messaging apps, where QR codes are distributed to trick users into scanning and executing malicious payloads. The threat actors employ social engineering tactics combined with technical evasion methods like URL shorteners and deep linking to circumvent security controls and exploit user trust in QR codes. The geopolitical tags referencing Ukraine and Russia suggest that some campaigns may be linked to ongoing conflicts or regional tensions, potentially influencing targeting and attack motivations. While no known exploits are currently active in the wild, the threat remains significant due to the widespread use of QR codes and the difficulty in detecting malicious content embedded within them. The medium severity rating reflects the moderate ease of exploitation combined with the potential for significant impact on confidentiality and integrity, particularly in financial contexts.
Potential Impact
European organizations, especially those in the financial sector, face considerable risk from this threat due to the potential for credential theft, account takeover, and malware infection via QR codes. Compromise of financial accounts can lead to direct financial losses, reputational damage, and regulatory penalties under GDPR and PSD2 frameworks. The use of in-app deep links and direct APK downloads can undermine mobile device security, potentially leading to broader network infiltration if compromised devices are used for corporate access. Messaging platforms popular in Europe can serve as vectors for distributing malicious QR codes, increasing the attack surface. The geopolitical context involving Ukraine and Russia may heighten the risk for organizations in Eastern Europe or those with business ties to these regions, as threat actors may leverage regional conflicts to target specific entities. Additionally, the difficulty in detecting malicious QR codes and the reliance on user interaction increase the likelihood of successful phishing attempts, amplifying the threat's impact on confidentiality, integrity, and availability of critical systems and data.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to QR code phishing threats. First, enhance user awareness training focused specifically on the risks of scanning unsolicited QR codes, emphasizing verification of source and destination URLs. Deploy mobile security solutions capable of analyzing QR code content before execution, including URL reputation checks and sandboxing of downloaded APKs. Enforce strict app installation policies on corporate devices, restricting installations to official app stores and employing mobile device management (MDM) solutions to control app permissions and detect unauthorized installations. Integrate URL filtering and web proxy solutions that can decode and inspect URL shorteners to block access to malicious destinations. For messaging platforms, implement controls to scan and quarantine messages containing QR codes or suspicious links. Financial institutions should apply additional authentication measures such as multi-factor authentication (MFA) to mitigate account takeover risks. Regularly monitor threat intelligence feeds for emerging QR code phishing campaigns, especially those linked to geopolitical conflicts, to adapt defenses promptly. Finally, encourage reporting and rapid incident response procedures to contain and remediate infections or breaches resulting from QR code phishing.
Affected Countries
United Kingdom, Germany, France, Poland, Ukraine, Netherlands, Italy, Spain
Indicators of Compromise
- domain: 2fbing.com
- domain: awawc.icu
- domain: bostonsportsthenandnow.com
- domain: gricanjolt.com
- domain: gui-grafit.online
- domain: gui-snitch.online
- domain: kccomputech.in
- domain: kropyva-group.online
- domain: kzeva2010.sbs
- domain: malicious-website.com
- domain: qrcc.io
- domain: radenspinrtp.cloud
- domain: signal-qr.org
- domain: snitch-dev.space
- domain: solulu.vip
- domain: ve1edm.cc
- domain: ve2edm.cc
- domain: weppf.icu
- domain: wswwc.icu
- domain: xx.com
- domain: 90999.fdjk34sddsf90999.cc
- domain: azojwdsj.xinchaoshan.com
- domain: cdnimg.jeayacrai.in.net
- domain: csdh.wangzhan.mobi
- domain: fable.tele-tale.cn
- domain: gld45a.cqxqlsz.com
- domain: gui.dev-snitch.cloud
- domain: gui.dev-snitch.online
- domain: gui.dev-snitch.site
- domain: gui.dev-snitch.xyz
- domain: gui.snitch-dev.online
- domain: gui.snitch-dev.site
- domain: gui.snitch-dev.xyz
- domain: link.members-ms.jp
- domain: resourcepro.tycheint.com
- domain: signal.skyriver.ch
- domain: snitch.open-group.site
- domain: t.k12.com.cn
- domain: www.malicious-url.com
- domain: www.phishing-meeting-link-url.com
- domain: www.sgnl-web.org-status.nl
- domain: xlq.wpybta.icu
Phishing on the Edge of the Web and Mobile Using QR Codes
Description
This article explores the misuse of QR codes in phishing attacks, focusing on three key areas: QR codes with URL shorteners concealing malicious destinations, in-app deep links used to steal credentials and control victims' apps, and QR codes bypassing app store security via direct malicious app downloads. The research reveals an average of 11,000 daily detections of malicious QR codes, with financial services being the most targeted industry. Attackers are leveraging QR code shorteners, in-app deep links, and direct downloads to evade security controls and exploit users' trust in QR codes. The article highlights specific attack scenarios, including account takeovers through messaging apps and distribution of suspicious gambling apps.
AI-Powered Analysis
Technical Analysis
The analyzed threat centers on the exploitation of QR codes as vectors for phishing and malware distribution on web and mobile platforms. Attackers use URL shorteners embedded in QR codes to obscure malicious URLs, making it difficult for users and security tools to detect the true destination. In-app deep links are leveraged to initiate credential theft and gain control over victim applications, enabling account takeovers and unauthorized actions within apps. Additionally, QR codes are used to bypass traditional app store vetting by directly linking to malicious APK files, such as nagapocker.apk and ludashi_home.apk, facilitating the installation of malware outside official channels. The research highlights an average of 11,000 daily detections of such malicious QR codes, with financial services being the most heavily targeted sector due to the high value of credentials and accounts. Attack scenarios include phishing via messaging apps, where QR codes are distributed to trick users into scanning and executing malicious payloads. The threat actors employ social engineering tactics combined with technical evasion methods like URL shorteners and deep linking to circumvent security controls and exploit user trust in QR codes. The geopolitical tags referencing Ukraine and Russia suggest that some campaigns may be linked to ongoing conflicts or regional tensions, potentially influencing targeting and attack motivations. While no known exploits are currently active in the wild, the threat remains significant due to the widespread use of QR codes and the difficulty in detecting malicious content embedded within them. The medium severity rating reflects the moderate ease of exploitation combined with the potential for significant impact on confidentiality and integrity, particularly in financial contexts.
Potential Impact
European organizations, especially those in the financial sector, face considerable risk from this threat due to the potential for credential theft, account takeover, and malware infection via QR codes. Compromise of financial accounts can lead to direct financial losses, reputational damage, and regulatory penalties under GDPR and PSD2 frameworks. The use of in-app deep links and direct APK downloads can undermine mobile device security, potentially leading to broader network infiltration if compromised devices are used for corporate access. Messaging platforms popular in Europe can serve as vectors for distributing malicious QR codes, increasing the attack surface. The geopolitical context involving Ukraine and Russia may heighten the risk for organizations in Eastern Europe or those with business ties to these regions, as threat actors may leverage regional conflicts to target specific entities. Additionally, the difficulty in detecting malicious QR codes and the reliance on user interaction increase the likelihood of successful phishing attempts, amplifying the threat's impact on confidentiality, integrity, and availability of critical systems and data.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to QR code phishing threats. First, enhance user awareness training focused specifically on the risks of scanning unsolicited QR codes, emphasizing verification of source and destination URLs. Deploy mobile security solutions capable of analyzing QR code content before execution, including URL reputation checks and sandboxing of downloaded APKs. Enforce strict app installation policies on corporate devices, restricting installations to official app stores and employing mobile device management (MDM) solutions to control app permissions and detect unauthorized installations. Integrate URL filtering and web proxy solutions that can decode and inspect URL shorteners to block access to malicious destinations. For messaging platforms, implement controls to scan and quarantine messages containing QR codes or suspicious links. Financial institutions should apply additional authentication measures such as multi-factor authentication (MFA) to mitigate account takeover risks. Regularly monitor threat intelligence feeds for emerging QR code phishing campaigns, especially those linked to geopolitical conflicts, to adapt defenses promptly. Finally, encourage reporting and rapid incident response procedures to contain and remediate infections or breaches resulting from QR code phishing.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://unit42.paloaltonetworks.com/qr-codes-as-attack-vector/"]
- Adversary
- null
- Pulse Id
- 698feecd9634c758b58f2ace
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domain2fbing.com | — | |
domainawawc.icu | — | |
domainbostonsportsthenandnow.com | — | |
domaingricanjolt.com | — | |
domaingui-grafit.online | — | |
domaingui-snitch.online | — | |
domainkccomputech.in | — | |
domainkropyva-group.online | — | |
domainkzeva2010.sbs | — | |
domainmalicious-website.com | — | |
domainqrcc.io | — | |
domainradenspinrtp.cloud | — | |
domainsignal-qr.org | — | |
domainsnitch-dev.space | — | |
domainsolulu.vip | — | |
domainve1edm.cc | — | |
domainve2edm.cc | — | |
domainweppf.icu | — | |
domainwswwc.icu | — | |
domainxx.com | — | |
domain90999.fdjk34sddsf90999.cc | — | |
domainazojwdsj.xinchaoshan.com | — | |
domaincdnimg.jeayacrai.in.net | — | |
domaincsdh.wangzhan.mobi | — | |
domainfable.tele-tale.cn | — | |
domaingld45a.cqxqlsz.com | — | |
domaingui.dev-snitch.cloud | — | |
domaingui.dev-snitch.online | — | |
domaingui.dev-snitch.site | — | |
domaingui.dev-snitch.xyz | — | |
domaingui.snitch-dev.online | — | |
domaingui.snitch-dev.site | — | |
domaingui.snitch-dev.xyz | — | |
domainlink.members-ms.jp | — | |
domainresourcepro.tycheint.com | — | |
domainsignal.skyriver.ch | — | |
domainsnitch.open-group.site | — | |
domaint.k12.com.cn | — | |
domainwww.malicious-url.com | — | |
domainwww.phishing-meeting-link-url.com | — | |
domainwww.sgnl-web.org-status.nl | — | |
domainxlq.wpybta.icu | — |
Threat ID: 6992f627bda29fb02f678619
Added to database: 2/16/2026, 10:49:11 AM
Last enriched: 2/16/2026, 11:04:24 AM
Last updated: 2/21/2026, 12:20:25 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-20
MediumAndroid threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.