Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Phishing on the Edge of the Web and Mobile Using QR Codes

0
Medium
Published: Sat Feb 14 2026 (02/14/2026, 03:41:01 UTC)
Source: AlienVault OTX General

Description

This article explores the misuse of QR codes in phishing attacks, focusing on three key areas: QR codes with URL shorteners concealing malicious destinations, in-app deep links used to steal credentials and control victims' apps, and QR codes bypassing app store security via direct malicious app downloads. The research reveals an average of 11,000 daily detections of malicious QR codes, with financial services being the most targeted industry. Attackers are leveraging QR code shorteners, in-app deep links, and direct downloads to evade security controls and exploit users' trust in QR codes. The article highlights specific attack scenarios, including account takeovers through messaging apps and distribution of suspicious gambling apps.

AI-Powered Analysis

AILast updated: 02/16/2026, 11:04:24 UTC

Technical Analysis

The analyzed threat centers on the exploitation of QR codes as vectors for phishing and malware distribution on web and mobile platforms. Attackers use URL shorteners embedded in QR codes to obscure malicious URLs, making it difficult for users and security tools to detect the true destination. In-app deep links are leveraged to initiate credential theft and gain control over victim applications, enabling account takeovers and unauthorized actions within apps. Additionally, QR codes are used to bypass traditional app store vetting by directly linking to malicious APK files, such as nagapocker.apk and ludashi_home.apk, facilitating the installation of malware outside official channels. The research highlights an average of 11,000 daily detections of such malicious QR codes, with financial services being the most heavily targeted sector due to the high value of credentials and accounts. Attack scenarios include phishing via messaging apps, where QR codes are distributed to trick users into scanning and executing malicious payloads. The threat actors employ social engineering tactics combined with technical evasion methods like URL shorteners and deep linking to circumvent security controls and exploit user trust in QR codes. The geopolitical tags referencing Ukraine and Russia suggest that some campaigns may be linked to ongoing conflicts or regional tensions, potentially influencing targeting and attack motivations. While no known exploits are currently active in the wild, the threat remains significant due to the widespread use of QR codes and the difficulty in detecting malicious content embedded within them. The medium severity rating reflects the moderate ease of exploitation combined with the potential for significant impact on confidentiality and integrity, particularly in financial contexts.

Potential Impact

European organizations, especially those in the financial sector, face considerable risk from this threat due to the potential for credential theft, account takeover, and malware infection via QR codes. Compromise of financial accounts can lead to direct financial losses, reputational damage, and regulatory penalties under GDPR and PSD2 frameworks. The use of in-app deep links and direct APK downloads can undermine mobile device security, potentially leading to broader network infiltration if compromised devices are used for corporate access. Messaging platforms popular in Europe can serve as vectors for distributing malicious QR codes, increasing the attack surface. The geopolitical context involving Ukraine and Russia may heighten the risk for organizations in Eastern Europe or those with business ties to these regions, as threat actors may leverage regional conflicts to target specific entities. Additionally, the difficulty in detecting malicious QR codes and the reliance on user interaction increase the likelihood of successful phishing attempts, amplifying the threat's impact on confidentiality, integrity, and availability of critical systems and data.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to QR code phishing threats. First, enhance user awareness training focused specifically on the risks of scanning unsolicited QR codes, emphasizing verification of source and destination URLs. Deploy mobile security solutions capable of analyzing QR code content before execution, including URL reputation checks and sandboxing of downloaded APKs. Enforce strict app installation policies on corporate devices, restricting installations to official app stores and employing mobile device management (MDM) solutions to control app permissions and detect unauthorized installations. Integrate URL filtering and web proxy solutions that can decode and inspect URL shorteners to block access to malicious destinations. For messaging platforms, implement controls to scan and quarantine messages containing QR codes or suspicious links. Financial institutions should apply additional authentication measures such as multi-factor authentication (MFA) to mitigate account takeover risks. Regularly monitor threat intelligence feeds for emerging QR code phishing campaigns, especially those linked to geopolitical conflicts, to adapt defenses promptly. Finally, encourage reporting and rapid incident response procedures to contain and remediate infections or breaches resulting from QR code phishing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/qr-codes-as-attack-vector/"]
Adversary
null
Pulse Id
698feecd9634c758b58f2ace
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domain2fbing.com
domainawawc.icu
domainbostonsportsthenandnow.com
domaingricanjolt.com
domaingui-grafit.online
domaingui-snitch.online
domainkccomputech.in
domainkropyva-group.online
domainkzeva2010.sbs
domainmalicious-website.com
domainqrcc.io
domainradenspinrtp.cloud
domainsignal-qr.org
domainsnitch-dev.space
domainsolulu.vip
domainve1edm.cc
domainve2edm.cc
domainweppf.icu
domainwswwc.icu
domainxx.com
domain90999.fdjk34sddsf90999.cc
domainazojwdsj.xinchaoshan.com
domaincdnimg.jeayacrai.in.net
domaincsdh.wangzhan.mobi
domainfable.tele-tale.cn
domaingld45a.cqxqlsz.com
domaingui.dev-snitch.cloud
domaingui.dev-snitch.online
domaingui.dev-snitch.site
domaingui.dev-snitch.xyz
domaingui.snitch-dev.online
domaingui.snitch-dev.site
domaingui.snitch-dev.xyz
domainlink.members-ms.jp
domainresourcepro.tycheint.com
domainsignal.skyriver.ch
domainsnitch.open-group.site
domaint.k12.com.cn
domainwww.malicious-url.com
domainwww.phishing-meeting-link-url.com
domainwww.sgnl-web.org-status.nl
domainxlq.wpybta.icu

Threat ID: 6992f627bda29fb02f678619

Added to database: 2/16/2026, 10:49:11 AM

Last enriched: 2/16/2026, 11:04:24 AM

Last updated: 2/21/2026, 12:20:25 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats