Skip to main content
    BeginnerLes 4 van 9·Phishing & social-engineering e-mail

    QR Phishing (Quishing) in 2026 — Why a Camera Is Now an Attack Surface

    QR phishing — sometimes called quishing — uses a QR code to deliver a malicious URL that bypasses every email-layer security control because the link never appears as text to scan. The 2026 attack patterns are QR-in-attachment (slipped into PDFs and images), physical QR overlay (stickers placed on parking meters, EV chargers, posters, restaurant menus), and corporate-IT-themed QR (fake MFA-renewal posters in office lifts).

    Reviewed by the HackersHub team — updated 13 May 20267 min readVrij te gebruiken — CC-BY-ND 4.0

    Het scenario

    On a Tuesday morning the IT communications team at a 6,000-person Dutch insurer puts up a poster in every lift: 'Mandatory MFA refresh by Friday — scan to begin'. There are three QR codes per lift, all leading to the company's IdP self-service portal. By Thursday afternoon a security analyst notices that the poster in the south-tower main lift has a glossy A4 overlay taped neatly across the bottom third — same colours, same fonts, with the three QR codes replaced. The overlay points to login-insurer.identityaccess.cn, a perfectly cloned IdP login page hosted from a hijacked Chinese cloud tenant. Forty-one employees have already submitted credentials and OTP codes. The attacker has been registering FIDO devices on those accounts in real time using a Evilginx-style reverse-proxy kit. The breach is detected only because the analyst happened to take the south-tower lift and noticed the misalignment of the overlay's edges. Two of the compromised accounts were domain admins. The remediation cost roughly €380,000 and the firm's NIS2-mandated 24-hour notification clock had already started.

    Hoe de aanval werkt

    QR phishing relies on three structural features the email security stack cannot fix. First, the destination URL is hidden inside the QR image — most mobile camera apps show the destination domain for under two seconds before opening, and most users tap before reading. Second, when the QR arrives inside an email attachment (PDF, PNG, JPG) the security gateway sees an image, not a link, so URL-rewriting and link-detonation controls never run. Third, the same QR can be deployed physically: stickers placed over real QR codes on parking meters, EV chargers, restaurant menus and corporate posters give the attacker a brand-credible delivery channel that no software product can see. The post-scan flow is identical to email phishing — a brand-cloned login page or payment page, optionally backed by an Evilginx-style reverse proxy to capture MFA tokens in real time. MITRE ATT&CK techniques: T1566.002 (Spearphishing Link, delivered out-of-band), T1539 (Steal Web Session Cookie) via reverse-proxy kits, T1192-style phishing applied to non-email channels. The most effective controls are user-side (always check the destination domain before entering credentials, distrust any QR pointing to a non-corporate IdP for work tasks) and physical (periodic walk-throughs to detect overlay stickers on official posters and on public infrastructure where staff use payment QRs).

    Waar je op moet letten

    • QR codes embedded in email attachments — especially PDFs from unknown senders or unexpected internal communications
    • Physical QR stickers that look slightly off-axis, glossy when the underlying surface is matte, or covering an existing QR (look for adhesive edges)
    • QR posters in lifts, lobbies, parking garages, on restaurant tables, EV chargers, parking meters — anywhere ad-hoc payment or authentication is implied
    • QR codes pointing to a domain that is not your normal corporate IdP, your bank's actual domain, or the merchant's verified URL — always read the full URL the camera previews before tapping
    • Hand-printed or low-quality QR codes on otherwise professional materials — a mismatch suggests the QR was added later
    • QR followed immediately by a login page asking for credentials, OTP, or payment authorisation
    • QR-based 'mandatory MFA refresh' or 'mandatory password reset' messages — legitimate enterprise IdPs rarely require a QR-mediated flow

    Wat te doen

    1. Always read the preview URL the camera shows before tapping through — every timeConfirm the domain matches your IdP, your bank, or the merchant. If you cannot read it (URL shortener, IP address, unfamiliar TLD), do not proceed.
    2. Never enter credentials, OTPs or payment info on a page reached by scanning a QR — open the official app or type the URL manuallyIf a corporate task is genuinely required, navigate to it from a bookmark or via the company intranet, not via the QR.
    3. If you encounter a suspicious physical QR sticker, report itFor office-environment stickers, report to your facilities + security teams so they can be removed and the area swept. For public infrastructure (chargers, parking meters), report to the operator and to your bank if you have already paid.
    4. If you scanned and submitted credentials, treat as a compromise immediatelyChange the password from a known-clean device, revoke active sessions, re-enrol MFA, and escalate to security so they can investigate concurrent logins.
    5. Inspect QR-bearing emails as suspicious by default — especially attachmentsThe most credible-looking emails (HR forms, signed contracts, MFA-renewal notices) are the prime QR-phishing carriers.

    Verdediging — voor IT en beleid

    Technische controles

    • Mobile device management (MDM) that includes QR-link analysis on managed devices (Microsoft Defender, Lookout, Zimperium offer this in 2026)
    • Email gateway with attachment OCR + QR-decoder + URL detonation — the only way to catch QR-in-PDF before delivery
    • FIDO2 / passkey MFA that is domain-bound — defeats reverse-proxy kits served via QR-delivered links
    • Internal QR registry: every corporate-issued QR poster signs its target URL with a code the security team maintains; any unsigned QR detected on internal walls is investigated
    • Browser-level safe-browsing on the corporate fleet that flags newly-registered or low-reputation domains immediately after the QR-tap

    Beleidscontroles

    • Written policy: corporate IT will never deliver an MFA reset, password reset, or credential-action via QR code. Employees report any such QR as a phishing attempt.
    • Procurement policy: any external-facing QR code on company premises must be approved by security and listed in the internal QR registry before being deployed
    • Facilities walk-through SOP: weekly visual sweep of high-touch areas (lifts, lobbies, parking garages, communal printers) for overlay stickers
    • Public-payment guidance: when scanning a QR on public infrastructure (EV charger, parking meter), prefer the operator's mobile app over the QR-led flow whenever practical

    Trainingsfrequentie

    Include at least one quarterly simulation with a QR-in-PDF or QR-in-physical-poster lure, paired with the SMS/voice variants. Track reporting rate of suspicious physical QRs as a leading indicator of employee awareness — clicks alone are an incomplete metric for this attack class.

    Korte check

    Vijf vragen. Antwoorden en toelichting verschijnen na inzenden.

    1. Q1.

      A PDF lands in your inbox from your IT department titled 'Mandatory MFA refresh — scan inside'. What is your safest action?

    2. Q2.

      Why is QR phishing particularly hard for email security to catch?

    3. Q3.

      You notice an A4 overlay taped on top of a corporate QR poster in your office lift. Most likely cause?

    4. Q4.

      Which control most directly defeats a reverse-proxy phishing kit served via a QR-delivered URL?

    5. Q5.

      Is it ever safe to enter your login credentials on a website you reached by scanning a public QR code?

    Bronnen & verdere lectuur

    Verwante modules

    Wil je een echte aanvaller in je omgeving testen?

    HackersHub voert betaalde red-team-engagements uit.

    Praat met een expert

    Deze module is door HackersHub goedgekeurd in exact deze vorm, inclusief watermerk. Gratis onder CC-BY-ND 4.0. Wil je de inhoud aanpassen? Verwijder dan eerst ons watermerk. — Het HackersHub-team Bekijk licentievoorwaarden.