QR Code Attacks in the Wild


Introduction

QR codes have become a silent battleground for cybercriminals. Unlike phishing emails, QR attacks bypass traditional defenses by exploiting the physical-digital trust bridge. In this analysis, we dissect three real-world attack chains observed in 2023-2025, reverse-engineered during our penetration testing engagements. Our goal: arm defenders with actionable intelligence to detect and neutralize these threats.


Attack 1: Tampered Parking Meter QR Codes

Adversary Objectives

Attack Chain

  1. Reconnaissance:
    • Attackers identify high-traffic parking zones with static QR codes.
    • Use thermal sticker paper to create tamper-resistant overlays matching municipal designs.
  2. Exploitation:
    • Clone the payment portal using TLS-certified domains (e.g., pay.tirana-parking[.]al vs. pay.tiranaparking[.]al).
    • Integrate cryptocurrency payment processors (Coinbase Commerce, BTCPayServer) for instant, untraceable payouts.
  3. Post-Exploitation:
    • Auto-convert funds to Monero via CoinJoin mixers.
    • Deploy Wi-Fi Pineapples nearby to intercept victims attempting to report fraud.

Technical Indicator:


Attack 2: Wi-Fi QR Codes in Enterprise Networks

Adversary Objectives

Attack Chain

  1. Initial Access:
    • Plant QR stickers with “Guest Wi-Fi” instructions in office lobbies, restrooms, or conference rooms.
  2. Payload Delivery:
    • QR codes configure devices to connect to an “attacker-AP” with DHCP options pointing to malicious DNS (e.g., 172.16.0.53).
    • Deploy a captive portal mimicking Okta/Entra ID SSO.
  3. Persistence:
    • Use harvested credentials to phish IT teams via “MFA reset” requests.
    • Abuse SSO session cookies (e.g., refresh_token) for O365 API access.

Technical Artifacts:


Attack 3: Malicious Calendar QR Codes

Adversary Objectives

Attack Chain

  1. Weaponization:
    • Generate calendar invites with QR codes linking to .ics files hosted on SharePoint/Google Drive.
    • Embed hidden iframes to exploit WebP vulnerabilities (CVE-2023-4863) when previewed.
  2. Execution:
    • Exploit libwebp buffer overflow to deploy Cobalt Strike beacons.
    • Bypass Mark-of-the-Web (MotW) warnings by hosting files on “trusted” domains.
  3. Exfiltration:
    • Use QR-triggered geolocation prompts to infer victim locations for targeted blackmail.

Detection Signatures:


How to Detect & Mitigate QR Code Threats

For Defenders

  1. Physical Security:
    • Conduct weekly audits of public-facing QR codes (e.g., posters, kiosks).
    • Use UV markers to tag legitimate codes (invisible to attackers).
  2. Network Monitoring:
    • Flag DNS requests to newly registered domains (NRDs) originating from QR scans.
    • Block QR-generated Wi-Fi profiles via MDM policies (e.g., Jamf, Intune).
  3. Endpoint Hardening:
    • Disable automatic QR code actions (e.g., calendar adds, Wi-Fi connects).
    • Patch libwebp and other rendering libraries (CVE-2023-4863).

Why Partner with RedSense?


Conclusion: QR Codes Demand Zero-Trust Vigilance

QR code attacks succeed because they weaponize convenience. Defenders must adopt a hybrid approach:

During a 2025 engagement, we found that organizations combining automated QR audits with quarterly red team exercises reduced successful phishing scans by 81%. The stakes are too high for half-measures.

Ready to Test Your QR Code Defenses?
Contact Us for a custom adversary simulation—because seeing is believing and defending

EnglishFrançaisShqip