Improve end user resilience against QR code phishing

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Community Hub.

QR codes are gaining popularity as an easy way to access information for services and products. While QR codes are often used as convenient shortcuts, they can also be used by cybercriminals to trick users into accidentally scanning QR codes and expose themselves to risks. Understanding the dangers of QR codes, such as being redirected to fake websites or downloading malware, is crucial. Education enables users to check if QR codes are genuine, examine destination URLs, and use reliable apps for scanning. In the ongoing fight against phishing, informed end users become an important line of defense, preventing possible threats and strengthening their organization’s resilience.

 

Recently, we have observed a new trend in phishing campaigns that leverage QR codes embedded in emails to evade detection and trick users into visiting malicious links. To help our customers defend against this emerging threat, Microsoft Defender for Office 365 has introduced several enhancements to its prevention capabilities that can detect and block QR code-based attacks. Check out this blog to learn more about QR codes and how Defender for Office 365 is protecting end users against such attacks: Protect your organizations against QR code phishing with Defender for Office 365

 

We also introduced several enhancements to its investigation, hunting and response capabilities to help security teams to hunt and respond to such threats. Read more about these enhancements here: Hunting and responding to QR code-based phishing attacks with Defender for Office 365

 

In addition to prevention, detection, and investigation capabilities, we are excited to share that Microsoft Defender for Office 365 has also made several updates to its simulation and training features.

 

As part of the simulation enhancements, you will now be able to perform the following tasks:

  1. Running a simulation with QR codes and tracking user response
  2. Utilizing out of the box Global payloads and creating a custom payload with QR codes
  3. Utilizing training content through video modules and how to guides

 

Running a simulation

There is no change in running a simulation. The current flow which involves selection of users, selection of payload, scheduling training, and notifications is also applicable for QR code-based simulations. Within simulations, you can select payloads with QR codes and use them for simulation.

 

Currently configuring payloads with QR codes and use of these payloads in a simulation is applicable to the Email platform and for the attack techniques below. Support for Teams platform and Link in Attachment, and attachment malware techniques will follow later. 

  1. Credential harvest
  2. Link to malware 
  3. Drive by URL
  4. OAuth consent grant

 

Given that QR codes are another vector for the phishing URL, the user events around read/delete/compromises/clicks remain the same—if a user is navigating to the URL after scanning the QR code, then it is tracked as a click event. The existing mechanisms for tracking compromise, deletes, and report events remain the same.

 

Global and Tenant Payloads

 

Global payloads

Our payload library now includes 75 payloads in five languages, addressing various real-world scenarios involving QR code attacks. These payloads can be found in the Content Library- Global Payloads, each beginning with QR code payloads (for example, QR code payloads: Prize Winner Notification). You can locate these by typing "QR" in the search bar.

Before implementing these payloads in your simulations, we advise examining their different fields and contents thoroughly.

 

Image: Attack simulation trainings libraryImage: Attack simulation trainings library

 

 

Tenant payloads

You can create a custom payload by duplicating the existing global payloads or creating a payload from scratch. Within the payload editing experience, you can insert QR codes using Dynamic Tags (Insert QR code) or formatting controls (QR code icon). You have the options to select the size and position of the QR code.

 

Image 1: Insert QR code dropdownImage 1: Insert QR code dropdown

 

 

Image 2: Insert QR codeImage 2: Insert QR code

 

 

Image 3: Insert QR code menuImage 3: Insert QR code menu

 

 

 

Image 4: Payload configuration and previewImage 4: Payload configuration and preview

 

 

The QR code that is generated will map to the phishing URL that is selected by you while configuring the payload in the payload wizard. When this payload is used in simulation, the service will replace the QR code with a dynamically generated QR code, to track click and compromise metrics. The size, position, and shape of the QR code would match the configuration of the QR set by you in the payload. 

 

Training content

We have provided two mechanisms for learning about QR based attacks: How-to guides, and new training modules from our content partner.

 

How-to guides

How-to guides are designed to provide lightweight guidance to end users on how to report a phishing message directly through email. By delivering these guides directly to the end user's inbox, we can ensure that the end user has the information they need to confidently report any suspicious emails.

 

You can filter for the How-to Guide through either:

  1. Filtering by Technique = How-to Guide
  2. Search by name = " Teaching Guide: How to recognize and report QR phishing messages

Image 5: Teaching guidesImage 5: Teaching guides

 

Out-of-the-box trainings

Within the trainings list (Content Library- Training Modules), we have added a new training called Malicious Digital QR Codes, which is a short learning to educate on what to do when a user receives a QR code in the email. You can assign the training as part of a simulation or use training campaigns to assign the training to your users.

 

Image 6: Out of the box training configurationImage 6: Out of the box training configuration

 

 

Image 7: Out of the box training previewImage 7: Out of the box training preview

 

 

More information

If you have other questions or feedback about Microsoft Defender for Office 365, engage with the community and Microsoft experts in the Defender for Office 365 forum.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.