This content is viewable by Everyone

Jun 2025: CREDENTIAL & QR CODE PHISHING WITH A PAYROLL LURE

CREDENTIAL & QR CODE PHISHING WITH A PAYROLL LURE Red Flags

Threat Alert: CREDENTIAL & QR CODE PHISHING WITH A PAYROLL LURE

  • Credential phishing threats often use various attachments to bypass detection and socially engineer recipients to harvest credentials.
  • Tactics involve threat actors prompting users to click on multiple attachments, adding layers to a social engineering attempt.
  • This threat includes an adversary-in-the-middle (AitM) credential phishing campaign that used multiple attachment types to lead to a QR code phishing threat.

How is it used in the wild?

  • This phishing campaign begins with an email claiming to be from the recipient’s HR department about a payroll adjustment.
  • The message body highlights header information from a separate email and includes an .eml attachment.
  • The .eml attachment contains a message about the payroll adjustment and prompts access to a .png attachment.
  • Both email messages include personalization to enhance engagement legitimacy.
  • The .png file contains a QR code that directs to a fake Microsoft page intended to steal credentials, including 2FA tokens and session cookies, through AitM capabilities.

Key Action: Stay Alert!

  • Be cautious with .eml attachments and QR codes from unsolicited or suspicious sources. These can deliver malicious content. Avoid opening them unless you're sure of the source.
  • Stay alert with .png files. They may contain malicious QR codes directing you to harmful websites.
  • Watch for suspicious behavior from contacts. If someone sends unusual messages, links, or uses unfamiliar language, their account may be compromised.
  • Verify unexpected notifications from HR by contacting your HR representative directly.
  • Report ANY suspicious emails via Phish Alarm.