DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Barracuda: Phishing Gangs Use Split And Nested QR Codes To Evade Detection

DigitalCIO Bureau by DigitalCIO Bureau
August 22, 2025
in Tech News
0
QR Code Scams Surge in India; Palo Alto Networks Urges Caution
75
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks. The techniques, detailed in a new threat report, involve splitting a malicious QR code into two to confuse traditional scanning systems or nesting the malicious QR code within or around a second, legitimate QR code.

Quishing is a form of phishing that involves the use of QR codes embedded with malicious links that, when scanned, redirect victims to fake websites designed to steal their credentials or other sensitive information.

The analysts found the split and nesting techniques in attacks by leading phishing-as-a-service (PhaaS) kits Tycoon and Gabagool.

Split QR codes
The Gabagool attackers were implementing split QR codes in a fake Microsoft ‘password reset’ scam. Their technique involves splitting the QR code into two separate images and embedding them close together in a phishing email. To the human eye, it looks like a single QR code. However, when traditional email security solutions scan the message, they see two distinct and benign-looking images rather than one complete QR code. If the recipient scans the image, they are directed to a phishing website designed to steal credentials.

Nested QR codes 
The Tycoon PhaaS was found using the nesting technique to wrap a malicious QR code around a legitimate QR code. The toxic outer QR code pointed to a malicious URL, while the inner QR code led to Google. This technique is likely designed to make it harder for scanners to detect the threat because the results are ambiguous.

“Malicious QR codes are popular with attackers because they look legitimate and can bypass traditional security measures such as email filters and link scanners,” said Saravan Mohankumar, Manager, Threat Analysis team at Barracuda. “Since recipients often have to switch to a mobile device to scan the code, it can take users out of the company security perimeter and away from protection. Attackers will keep trying new techniques to stay one step ahead of adapting security measures. It’s an area where integrated, AI-powered protection can make a difference.”

Defending against evolving QR codes 
Alongside the essential basics of security awareness training, multifactor authentication, and robust spam and email filters, organizations should consider multi-layered email protection that integrates multimodal AI capability to detect rapidly evolving threats. Multimodal AI enhances detection by identifying, decoding and inspecting the QR code without needing to extract the embedded content.

Tags: Barracuda
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NetApp Teams Up with Google Cloud to Strengthen Data Infrastructure for Distributed Cloud

by DigitalCIO Bureau
April 17, 2026
0
NetApp Teams Up with Google Cloud to Strengthen Data Infrastructure for Distributed Cloud

NetApp announced a 4‑year Enterprise Agreement with Google Cloud to accelerate deployment of NetApp storage solutions within Google Distributed Cloud air‑gapped, Google’s sovereign cloud platform delivered in partnership...

Read moreDetails

Elastic Appoints Atul Ahuja as Area Vice President and General Manager for India

by DigitalCIO Bureau
April 17, 2026
0
Elastic Appoints Atul Ahuja as Area Vice President and General Manager for India

Elastic has named Atul Ahuja as its new Area Vice President and General Manager for India. Atul announced his appointment via LinkedIn post he steps into the role...

Read moreDetails

TCS and University of Cincinnati Announce ‘My First AI Job’ Program to Prepare Students for Entry-Level AI Careers

by DigitalCIO Bureau
April 16, 2026
0
TCS and University of Cincinnati Announce ‘My First AI Job’ Program to Prepare Students for Entry-Level AI Careers

The Exclusive Program Aims to Train Students in AI Skills to Help Build a Future-Ready American Workforce  Tata Consultancy Services has unveiled its new TCS My First AI...

Read moreDetails

HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

by DigitalCIO Bureau
April 16, 2026
0
HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

New research highlights seven trends shaping identity, access and trust, alongside rising ethical and privacy concerns HIDreleased its 2026 State of Security and Identity Report, revealing how organisations...

Read moreDetails

Adobe Teams Up with Tesco to Personalise Experiences and Reward Loyalty for Tesco’s Customers

by DigitalCIO Bureau
April 14, 2026
0
Adobe Teams Up with Tesco to Personalise Experiences and Reward Loyalty for Tesco’s Customers

Adobe and Tesco have announced a new strategic AI partnership aimed at delivering more personalised, timely and relevant shopping experiences to Tesco customers across digital channels. The deal...

Read moreDetails
Next Post
Tenable Appoints Matthew Brown As Chief Financial Officer

Tenable Appoints Matthew Brown As Chief Financial Officer

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

AI Already Adopted by 78% of Software Testers

AI Already Adopted by 78% of Software Testers

December 6, 2023
Infosys to Acquire Leading Healthcare Digital Transformation Company, Optimum Healthcare IT

Infosys to Acquire Leading Healthcare Digital Transformation Company, Optimum Healthcare IT

March 31, 2026
Veeam Announces Backup-As-A-Service For Microsoft 365 And Microsoft Azure

New Zero Trust Data Resilience Model Introduced by IT Security and Data Protection Experts

December 1, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?