The scenario
On a Tuesday morning the IT communications team at a 6,000-person Dutch insurer puts up a poster in every lift: 'Mandatory MFA refresh by Friday — scan to begin'. There are three QR codes per lift, all leading to the company's IdP self-service portal. By Thursday afternoon a security analyst notices that the poster in the south-tower main lift has a glossy A4 overlay taped neatly across the bottom third — same colours, same fonts, with the three QR codes replaced. The overlay points to login-insurer.identityaccess.cn, a perfectly cloned IdP login page hosted from a hijacked Chinese cloud tenant. Forty-one employees have already submitted credentials and OTP codes. The attacker has been registering FIDO devices on those accounts in real time using a Evilginx-style reverse-proxy kit. The breach is detected only because the analyst happened to take the south-tower lift and noticed the misalignment of the overlay's edges. Two of the compromised accounts were domain admins. The remediation cost roughly €380,000 and the firm's NIS2-mandated 24-hour notification clock had already started.
How the attack works
QR phishing relies on three structural features the email security stack cannot fix. First, the destination URL is hidden inside the QR image — most mobile camera apps show the destination domain for under two seconds before opening, and most users tap before reading. Second, when the QR arrives inside an email attachment (PDF, PNG, JPG) the security gateway sees an image, not a link, so URL-rewriting and link-detonation controls never run. Third, the same QR can be deployed physically: stickers placed over real QR codes on parking meters, EV chargers, restaurant menus and corporate posters give the attacker a brand-credible delivery channel that no software product can see. The post-scan flow is identical to email phishing — a brand-cloned login page or payment page, optionally backed by an Evilginx-style reverse proxy to capture MFA tokens in real time. MITRE ATT&CK techniques: T1566.002 (Spearphishing Link, delivered out-of-band), T1539 (Steal Web Session Cookie) via reverse-proxy kits, T1192-style phishing applied to non-email channels. The most effective controls are user-side (always check the destination domain before entering credentials, distrust any QR pointing to a non-corporate IdP for work tasks) and physical (periodic walk-throughs to detect overlay stickers on official posters and on public infrastructure where staff use payment QRs).
What to watch for
- QR codes embedded in email attachments — especially PDFs from unknown senders or unexpected internal communications
- Physical QR stickers that look slightly off-axis, glossy when the underlying surface is matte, or covering an existing QR (look for adhesive edges)
- QR posters in lifts, lobbies, parking garages, on restaurant tables, EV chargers, parking meters — anywhere ad-hoc payment or authentication is implied
- QR codes pointing to a domain that is not your normal corporate IdP, your bank's actual domain, or the merchant's verified URL — always read the full URL the camera previews before tapping
- Hand-printed or low-quality QR codes on otherwise professional materials — a mismatch suggests the QR was added later
- QR followed immediately by a login page asking for credentials, OTP, or payment authorisation
- QR-based 'mandatory MFA refresh' or 'mandatory password reset' messages — legitimate enterprise IdPs rarely require a QR-mediated flow
What to do
- Always read the preview URL the camera shows before tapping through — every timeConfirm the domain matches your IdP, your bank, or the merchant. If you cannot read it (URL shortener, IP address, unfamiliar TLD), do not proceed.
- Never enter credentials, OTPs or payment info on a page reached by scanning a QR — open the official app or type the URL manuallyIf a corporate task is genuinely required, navigate to it from a bookmark or via the company intranet, not via the QR.
- If you encounter a suspicious physical QR sticker, report itFor office-environment stickers, report to your facilities + security teams so they can be removed and the area swept. For public infrastructure (chargers, parking meters), report to the operator and to your bank if you have already paid.
- If you scanned and submitted credentials, treat as a compromise immediatelyChange the password from a known-clean device, revoke active sessions, re-enrol MFA, and escalate to security so they can investigate concurrent logins.
- Inspect QR-bearing emails as suspicious by default — especially attachmentsThe most credible-looking emails (HR forms, signed contracts, MFA-renewal notices) are the prime QR-phishing carriers.
Defenses to deploy
Technical controls
- Mobile device management (MDM) that includes QR-link analysis on managed devices (Microsoft Defender, Lookout, Zimperium offer this in 2026)
- Email gateway with attachment OCR + QR-decoder + URL detonation — the only way to catch QR-in-PDF before delivery
- FIDO2 / passkey MFA that is domain-bound — defeats reverse-proxy kits served via QR-delivered links
- Internal QR registry: every corporate-issued QR poster signs its target URL with a code the security team maintains; any unsigned QR detected on internal walls is investigated
- Browser-level safe-browsing on the corporate fleet that flags newly-registered or low-reputation domains immediately after the QR-tap
Policy controls
- Written policy: corporate IT will never deliver an MFA reset, password reset, or credential-action via QR code. Employees report any such QR as a phishing attempt.
- Procurement policy: any external-facing QR code on company premises must be approved by security and listed in the internal QR registry before being deployed
- Facilities walk-through SOP: weekly visual sweep of high-touch areas (lifts, lobbies, parking garages, communal printers) for overlay stickers
- Public-payment guidance: when scanning a QR on public infrastructure (EV charger, parking meter), prefer the operator's mobile app over the QR-led flow whenever practical
Training cadence
Include at least one quarterly simulation with a QR-in-PDF or QR-in-physical-poster lure, paired with the SMS/voice variants. Track reporting rate of suspicious physical QRs as a leading indicator of employee awareness — clicks alone are an incomplete metric for this attack class.
Quick check
Five questions. Answers and rationale appear after submission.
- Q1.
A PDF lands in your inbox from your IT department titled 'Mandatory MFA refresh — scan inside'. What is your safest action?
- Q2.
Why is QR phishing particularly hard for email security to catch?
- Q3.
You notice an A4 overlay taped on top of a corporate QR poster in your office lift. Most likely cause?
- Q4.
Which control most directly defeats a reverse-proxy phishing kit served via a QR-delivered URL?
- Q5.
Is it ever safe to enter your login credentials on a website you reached by scanning a public QR code?