PUREVPN
X

Watch out! QR codes becoming cemented to phishing attacks

PureVPN

Threat attackers are using QR codes to lead phishing campaigns. Microsoft has restricted macros in its files to avoid malicious codes.

“Data collected by the HP Threat Research team shows that from Q2 2022, attackers have been diversifying their techniques to find new ways to breach devices and steal data.”

QR scan scams on a verge

“We have seen malware distributors like Emotet try to work around Office’s stricter macro policy with complex social engineering tactics, which we believe are proving less effective. But when one door closes another opens – as shown by the rise in scan scams, malvertising, archives, and PDF malware,” explains, Senior Malware Analyst, HP Wolf Security threat research team, HP.

Prevention techniques by experts

“While techniques evolve, threat actors still rely on social engineering to target users at the endpoint,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP.

In Q4, HP also found 24 popular software projects imitated in malvertising campaigns used to infect PCs with eight malware families.

The attacks rely on users clicking on search engine advertisements, which leads to malicious websites that look almost identical to the real websites.

Therefore it is important to be cautious while scanning QR codes, especially from unknown sources. Verify the source of the code and the website it leads to before entering any sensitive information.

Using up-to-date operating systems and anti-virus to prevent attacks. Also, it is better not to scan if you are unsure about the source.

In the end

Phishing attacks can take many forms, including email phishing, spear phishing, and smishing, and can be difficult to detect because they often appear to be legitimate communications from trusted sources.

Phishing attacks can have serious consequences for individuals and organizations, including financial losses, reputational damage, and data breaches. Be safe!

“Organizations should deploy strong isolation to contain the most common attack vectors like email, web browsing, and downloads. Combine this with credential protection solutions that warn or prevent users from entering sensitive details onto suspicious sites to greatly reduce the attack surface and improve an organization’s security posture.”

Categories:
Tags:
Leave Comment