Executive Summary
In late December 2023, a novel phishing campaign was observed in which attackers delivered emails containing QR codes crafted not from traditional images, but rendered using HTML tables. The campaign targeted end users with messages between December 22nd and December 26th, embedding visually normal but technically 'imageless' QR codes. When scanned, these QR codes redirected victims to phishing domains customized per recipient, aiming to harvest credentials. By sidestepping standard image-based security controls, these emails successfully bypassed common email security gateways designed to detect embedded malicious QR codes.
This incident highlights adversary innovation in evading current email security technologies by exploiting overlooked content formats. It underscores ongoing risks as attackers adapt tactics to defeat both legacy and modern defensive controls. As sophisticated phishing methods proliferate, organizations must focus on layered defenses and continuous user education.
Why This Matters Now
Attackers are increasingly bypassing established email defenses by rendering malicious content through unconventional methods, such as HTML-based QR codes. This approach evades detection by traditional image-analysis tools, emphasizing the urgent need for organizations to update both their technical controls and user training to counter rapidly evolving phishing techniques.
Attack Path Analysis
Attackers delivered phishing emails with QR codes rendered via HTML tables to evade image-based detection, tricking users into scanning and visiting malicious websites. Upon login at these sites, victims may have unknowingly supplied credentials or access tokens. With compromised credentials, adversaries could attempt to access more privileged cloud resources. If successful, lateral movement may be possible within the cloud environment. Adversaries establish communication with their infrastructure for control or further exploitation, and may exfiltrate sensitive data. The final impact depends on how the stolen information is used, including potential account takeover or data breach.
Kill Chain Progression
Initial Compromise
Description
Users receive phishing emails using cleverly rendered HTML table QR codes that link to malicious domains, enticing victims to scan and authenticate, leading to credential harvesting.
Related CVEs
CVE-2024-8914
CVSS 7.2A stored cross-site scripting vulnerability in the Thanh Toán Quét Mã QR Code Tự Động plugin allows unauthenticated attackers to inject malicious scripts into web pages.
Affected Products:
Thanh Toán Quét Mã QR Code Tự Động – MoMo, ViettelPay, VNPay – <= 2.0.1
Exploit Status:
no public exploitCVE-2023-5567
CVSS 6.5The QR Code Tag plugin for WordPress is vulnerable to stored cross-site scripting via the 'qrcodetag' shortcode, allowing authenticated attackers to inject arbitrary web scripts.
Affected Products:
WordPress QR Code Tag Plugin – <= 1.0
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Technique selection reflects phishing via QR code obfuscation, defense evasion through HTML rendering and impersonation tactics. For full enrichment, further STIX/TAXII correlation may be performed.
Phishing: Spearphishing Attachment
Phishing: Spearphishing Link
User Execution: Malicious Link
Masquerading
Deobfuscate/Decode Files or Information
Application Layer Protocol: Web Protocols
Phishing for Information: Spearphishing via Service
Impair Defenses
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS v4.0 – Anti-Phishing Mechanisms
Control ID: 5.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Art. 8(2)
CISA Zero Trust Maturity Model 2.0 – Continuous Detection and Analysis of Communication Channels
Control ID: Email & Communication Protection
NIS2 Directive – Security of Network and Information Systems
Control ID: Article 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
HTML table-based QR code phishing bypasses traditional security controls, threatening transaction authentication systems and requiring enhanced egress security policy enforcement capabilities.
Health Care / Life Sciences
Imageless QR code techniques evade detection mechanisms, compromising patient data access portals and violating HIPAA compliance requirements for secure communication protocols.
Computer Software/Engineering
Novel HTML rendering attacks exploit assumptions in security tooling, necessitating zero trust segmentation and enhanced threat detection capabilities for software development environments.
Higher Education/Acadamia
QR code phishing campaigns target credential harvesting through academic portals, requiring improved user awareness training and multicloud visibility control implementations.
Sources
- A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)https://isc.sans.edu/diary/rss/32606Verified
- Cybercriminals use HTML to hide QR code phishinghttps://cybernews.com/security/cybercrooks-use-html-to-hide-qr-code-phishing/Verified
- HTML tables facilitate clandestine QR code phishinghttps://www.scworld.com/brief/html-tables-facilitate-clandestine-qr-code-phishingVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, egress controls, and continuous threat detection could have limited attacker movement, blocked malicious outbound connections, and detected anomalous QR code phishing patterns within the environment, substantially reducing risk at multiple kill chain stages.
Control: Threat Detection & Anomaly Response
Mitigation: Early phishing or unusual traffic patterns flagged for investigation.
Control: Zero Trust Segmentation
Mitigation: Privilege escalation attempts are blocked by least-privilege and identity-based segmentation.
Control: East-West Traffic Security
Mitigation: Detection and control of unauthorized internal traffic limits movement.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound connections to malicious domains are blocked or logged for threat investigation.
Control: Cloud Firewall (ACF)
Mitigation: Exfiltration channels are blocked, data loss is minimized.
Automated enforcement and visibility reduce the window of impact and support rapid response.
Impact at a Glance
Affected Business Functions
- Email Communications
- User Authentication
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of user credentials and sensitive information due to phishing attacks leading to unauthorized access.
Recommended Actions
Key Takeaways & Next Steps
- • Enhance email and endpoint detection for abnormal QR code and HTML-based phishing tactics.
- • Enforce Zero Trust segmentation and identity-aware access controls to prevent lateral movement with compromised credentials.
- • Implement robust egress filtering and DNS/FQDN controls to block malicious outbound and C2 connections.
- • Maintain comprehensive east-west traffic visibility to detect and restrict suspicious workload communication.
- • Continuously update threat intelligence and anomaly detection mechanisms to quickly flag emerging phishing delivery methods.



