QR code phishing has become one of the most rapidly growing forms of phishing, especially since QR codes gained popularity during the global pandemic. Recently, INKY has observed a new evolution of this tactic, where QR codes are constructed using HTML tables and ASCII characters. We’ve noticed this technique emerging over the past few months and have implemented protections against it. Now, we’d like to share how it works and how we defend against it.
Recent Posts
- CyberheistNews Vol 14 #52 [Heads Up] Bad Actors Use Voice Phishing in Microsoft Teams To Spread Malware
- Russia’s APT29 Launches Major Spear Phishing Campaign
- “Get Beyond Security Awareness Training” Does Not Mean Forgetting About It
- Mobile Phishing Attacks Use New Tactic to Bypass Security Measures
- Attackers Abuse HubSpot’s Free Form Builder to Craft Phishing Pages
Recent Comments