A complicated quishing marketing campaign leveraging weaponized QR codes has been uncovered, particularly concentrating on Microsoft customers with seemingly innocuous doc evaluation requests.
By exploiting superior evasion strategies—splitting the QR code into two separate pictures, utilizing non-standard shade palettes, and drawing the code instantly through PDF content material streams—attackers are in a position to bypass conventional antivirus and PDF-scanning defenses.
This new wave of quishing underscores the evolving risk panorama and highlights the necessity for heightened person vigilance when interacting with digital paperwork.
The marketing campaign begins with a phishing e-mail that seems to come back from DocuSign, informing recipients they’ve acquired a doc to evaluation and signal.
The e-mail physique features a QR code rendered in an attention grabbing however non-standard shade spectrum, making it mix into the doc’s design whereas thwarting typical QR-scanner heuristics.
Evaluation reveals the QR code shouldn’t be a single raster picture however is as a substitute partitioned into two picture objects throughout the PDF file. Every half of the code is rendered independently, then positioned to look as one cohesive QR sample when considered.
This splitting approach evades signature-based detection techniques, which generally seek for full-image QR patterns.

Moreover, as a substitute of embedding the QR code as a regular picture, the attackers draw the QR modules programmatically utilizing the PDF content-stream instructions.
By issuing exact drawing directions for every darkish and lightweight module, they keep away from embedding any recognizable QR picture file.
This content-stream method renders the code precisely for human viewers and cellular digital camera scanners however fully bypasses scanners that depend on picture extraction. The result’s a extremely resilient supply mechanism that may slip previous many PDF safety filters undetected.
The Assault Workflow and Payload Supply
As soon as a person scans the misleading QR code with a smartphone or pill, they’re redirected to a counterfeit Microsoft login web page hosted on a website designed to imitate the official Microsoft portal.


The web page encompasses a polished interface with official Microsoft branding, requesting customers to enter their credentials for “safe doc entry.” Captured credentials are exfiltrated in actual time, enabling risk actors to achieve unauthorized entry to company e-mail, OneDrive paperwork, and different Microsoft cloud providers.
Put up-credential theft, attackers could deploy multifactor bypass simulations, sending push-notification prompts to customers or subtly altering account settings to keep up persistence.
Moreover, compromised accounts are used to propagate additional phishing messages internally, leveraging the belief throughout the group to launch subsequent social engineering assaults.
In some instances, exfiltrated knowledge is monetized on darkish net marketplaces, whereas different campaigns pivot to deploying ransomware payloads or data-scraping malware throughout the sufferer’s community.
Mitigations
Defending towards this new quishing risk requires a mixture of technical controls, person consciousness coaching, and sturdy incident response planning.
Organizations ought to implement strict PDF scanning insurance policies that embrace content-stream evaluation able to detecting non-image QR-drawing directions.
Superior risk safety options should be configured to scrutinize PDF rendering instructions, flagging anomalies akin to a number of picture objects forming a single QR code.
On the person aspect, Microsoft prospects needs to be educated to confirm QR code sources earlier than scanning and to cross-check any surprising doc requests via various channels. Encouraging the usage of official doc portals instantly—slightly than QR-scanned hyperlinks—can decrease publicity to manipulated QR codes.
Multifactor authentication needs to be enforced throughout all accounts, utilizing {hardware} tokens or biometric strategies slightly than SMS or app-push notifications, to cut back the danger of credential-based account takeover.
In parallel, safety groups want to watch for anomalous login makes an attempt and area registrations that intently resemble official Microsoft endpoints.
Fast takedown procedures for fraudulent domains and coordinated disclosure with internet hosting suppliers can considerably cut back the window of alternative for attackers.
Proactive risk searching and intelligence sharing—particularly concerning indicators of compromise present in quishing payloads—will additional strengthen organizational resilience.
As quishing strategies proceed to advance, combining evasion strategies with misleading branding, staying sharp and protected stays crucial. Customers and safety groups alike should stay vigilant, adopting layered defenses to counter weaponized QR code assaults and shield essential Microsoft property in in the present day’s dynamic cybersecurity panorama.
Observe us on Google Information, LinkedIn, and X to Get Prompt Updates and Set GBH as a Most well-liked Supply in Google.