Quishing uses QR codes in emails to bypass security filters. The malicious link is hidden in an image, not scannable text. When scanned with a phone, users are taken to credential theft sites. Defence requires updated email security, user awareness, and mobile device controls.
Quick answer: Quishing uses QR codes in emails to bypass security filters. The malicious link is hidden in an image, not scannable text. When scanned with a phone, users are taken to credential theft sites. Defence requires updated email security, user awareness, and mobile device controls.
Why QR Phishing Works
Traditional email security scans text and URLs. QR codes hide URLs in images—invisible to basic filters.
The attack:
- Email arrives with QR code (often posing as MFA reset, document access, HR notice)
- Email security doesn't detect malicious URL (it's an image)
- User scans QR code with personal phone
- Phone opens malicious site outside corporate security controls
- User enters credentials on fake login page
- Attacker harvests credentials
- Bypasses email URL scanning
- Moves attack to personal mobile device
- Mobile browsers hide full URLs
- People trust QR codes (we've been trained to scan them)
- Urgency drives action ("Scan to verify your account")
Common Quishing Scenarios
MFA/Security verification "Your MFA is expiring. Scan to re-verify." "Suspicious login detected. Scan to secure your account."
HR and payroll "Scan to view your updated benefits package." "Required: Update your direct deposit information."
Document access "Scan to view shared document." "DocuSign: Scan to complete signature."
IT support "Scan to install required security update." "VPN access: Scan to configure."
Why Traditional Defences Fail
URL scanning: Can't read URLs embedded in images
Link rewriting: Nothing to rewrite—it's a picture
Reputation filtering: No URL to check until it's scanned
Sandboxing: Email contains an image, not an executable
The QR code creates a security blind spot.
How to Defend Against Quishing
1. Updated email security
Modern email security with:- QR code detection and analysis
- Image-based URL extraction
- AI/ML detection of quishing patterns
- Warning banners on emails containing QR codes
2. User awareness training
Train staff to:- Be suspicious of unexpected QR codes in emails
- Verify requests through other channels
- Check URLs before entering credentials
- Report suspicious QR code emails
3. Mobile device security
If users scan with corporate phones:- Mobile Threat Defence (MTD)
- Web filtering on mobile devices
- Managed browser requirements
- You've lost control—awareness is critical
- Consider blocking personal device email access
4. Conditional Access
Even if credentials are phished:- Block sign-ins from unusual locations
- Require compliant devices
- Detect risky sign-in patterns
- Use phishing-resistant MFA
5. Reporting culture
Make it easy to report suspicious emails:- One-click reporting button
- No blame for false positives
- Fast response to validate/block
Signs of Quishing Attempts
Red flags:
- Unexpected QR code in email
- Urgency ("Act within 24 hours")
- Generic greeting ("Dear User")
- Sender doesn't match claimed organisation
- Request for security action via QR code
- External email claiming to be internal
- Event tickets
- Restaurant menus
- Marketing materials
- Security verification via email QR code
- Password/MFA reset via QR code
- Document signing via QR code
What We Implement
We protect against quishing through:
- Advanced email security with QR code detection
- Security awareness training covering current threats
- Conditional Access limiting blast radius of stolen credentials
- Mobile security for corporate devices
- Incident response when attacks succeed
---
about email security updates.
---
