Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Attack Types

QR Phishing (Quishing)

A phishing technique that embeds malicious URLs inside QR codes to bypass text-based email security filters.

Definition

QR phishing (quishing) is a social engineering attack where threat actors embed malicious URLs inside QR codes delivered via email, SMS, or physical media. Because the payload is an image rather than a hyperlink, traditional email security gateways that scan for malicious links often fail to detect it. Victims are directed to credential-harvesting pages or malware distribution sites after scanning the code with a mobile device.

Why It Matters

Mobile devices used to scan QR codes typically have weaker security controls and less endpoint visibility than corporate workstations, making post-click detection harder. Quishing campaigns have been used to steal Microsoft 365 and other SSO credentials at scale, including targeted attacks against executives. Because the attack surface shifts to the user's personal phone, traditional EDR and network monitoring tools may never see the malicious traffic.

How It Works

An attacker crafts an email that appears to come from a trusted sender — commonly impersonating IT departments, DocuSign, or multi-factor authentication prompts — and embeds a QR code as an inline image or inside a PDF attachment. The QR code encodes a URL pointing to an attacker-controlled site, often protected by a redirect chain or CAPTCHA to evade automated scanners. When the victim scans the code with their phone, the browser is sent through one or more redirects before landing on a convincing login page that harvests credentials in real time.

DFIR Platform

Phishing Email Checker

The DFIR Lab Phishing Email Checker includes a dedicated QR code analysis module as part of its 26+ analysis pipeline. It extracts QR codes from both inline images and PDF attachments, decodes the embedded URLs, and feeds them into the full URL analysis pipeline — following redirect chains, checking domain reputation, and classifying landing pages for phishing indicators.

View Documentation

Related Concepts

Phishing AnalysisBusiness Email Compromise (BEC)SPF (Sender Policy Framework)DKIM (DomainKeys Identified Mail)

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free