Threat Intelligence

QR Code Phishing (Quishing): The Attack Vector Most Companies Ignore

PhishIQ TeamApril 8, 20266 min read

QR code phishing, known as quishing, has emerged as one of the fastest-growing attack vectors in 2026. The Proofpoint 2025 State of the Phish Report found that QR-code-based phishing attacks increased by over 400 percent year-over-year, yet fewer than 5 percent of organizations include QR code scenarios in their security awareness training. The attack exploits a fundamental gap: email security gateways analyze text, URLs, and attachments, but most cannot decode and inspect QR codes embedded in images. This means quishing emails reach inboxes at dramatically higher rates than traditional phishing.

How Do Quishing Attacks Work?

A typical quishing attack embeds a QR code in an email or document that appears to come from a trusted source such as IT support, HR, a building management system, or a parking service. The pretext is designed to feel routine: scan this code to update your MFA settings, verify your parking permit, access your benefits enrollment portal, or view a shared document. When the employee scans the QR code with their personal mobile device, they are redirected to a credential-harvesting page that mimics a legitimate login portal. The attack is particularly effective because personal mobile devices typically lack the enterprise security controls present on corporate laptops, employees trust QR codes as a familiar technology used in legitimate business contexts, the redirect happens on a personal device outside the organization's network monitoring, and email filters cannot inspect the URL encoded in the QR image.

Why Are Detection Rates So Low?

Traditional email security solutions analyze the text body, sender reputation, embedded URLs, and attachment file types of incoming messages. A quishing email typically contains no clickable URL in the message body, the malicious destination is encoded within a PNG or JPEG image of a QR code that security tools treat as a benign image, the email text is clean business language with no suspicious keywords, and the sender may be a compromised legitimate account with a trusted reputation. Some advanced email security platforms have begun adding QR code decoding capabilities, but adoption is still limited and the technology is easily evaded by using slightly modified QR formats, embedding codes in PDF attachments, or using dynamic QR codes that redirect through clean intermediate URLs before reaching the phishing page.

How Do You Add QR Simulations to Your Program?

Building a quishing simulation program requires adjusting both your technical infrastructure and your training approach. Start with awareness: many employees have never been warned about QR code phishing and do not associate QR codes with security risk. Introduce the concept through a brief educational module before launching simulations. For the simulation itself, create realistic QR codes that direct to benign tracking pages (not credential harvesting pages on personal devices, which raises privacy concerns). Track scan rates as your primary metric. Typical first-campaign scan rates for organizations that have never tested QR phishing are 30 to 45 percent, far higher than email phishing click rates, because employees have not been conditioned to be suspicious of QR codes.

What Should Your Anti-Quishing Policy Include?

Develop a clear policy that addresses QR code risks. Key elements include a prohibition on scanning QR codes received via email on personal devices without verification, guidance on using a QR code scanner that previews the URL before opening it, a process for reporting suspicious QR codes through the same channel used for phishing reports, and guidelines for legitimate internal use of QR codes (for example, requiring that all legitimate internal QR codes use a specific, recognizable short domain). Training should emphasize that QR codes in emails should be treated with the same suspicion as clickable links and that the same verification procedures apply. For organizations looking to build comprehensive multi-vector simulations, see our guides on SMS phishing simulation and voice phishing simulation.

Artigos relacionados

Industry Guide

Phishing Simulation Tools Comparison 2026: A Complete Guide

6 min read
Risk & ROI

How to Calculate Phishing Risk in Dollar Terms

5 min read
Compliance

Cyber Insurance Requirements: What You Need for 2026 Renewals

5 min read
Culture & Training

Building a Security Culture That Goes Beyond Annual Training

7 min read
Threat Intelligence

AI-Powered Phishing Attacks: What Defenders Need to Know in 2026

6 min read
Risk & ROI

Measuring Phishing Simulation ROI: Metrics That Matter to the C-Suite

5 min read
Threat Intelligence

Executive Targeting: How Spear-Phishing Campaigns Bypass Traditional Defenses

8 min read
Architecture

Integrating Phishing Simulation with Zero Trust Architecture

7 min read
Incident Response

Incident Response Playbook: When Employees Fall for Real Phishing

6 min read
Compliance

Phishing Simulation for Healthcare: Meeting HIPAA Requirements in 2026

7 min read
Industry Guide

Top 7 KnowBe4 Alternatives for Phishing Simulation in 2026

8 min read
Compliance

SOC 2 Security Awareness Training: What Auditors Actually Look For

6 min read
Risk & ROI

Phishing Click Rate Benchmarks by Industry: 2026 Data

5 min read
Threat Intelligence

SMS Phishing Simulation: How to Test Your Organization Against Smishing

6 min read
Compliance

Mapping Phishing Simulation Programs to NIST CSF 2.0

7 min read
Compliance

Phishing Simulation for Financial Services: SEC, FINRA & PCI DSS Compliance

7 min read
Industry Guide

What Is a Human Risk Management Platform? The 2026 Buyer's Guide

8 min read
Culture & Training

Phishing Simulation Best Practices: The 15-Point Checklist

6 min read
Threat Intelligence

MFA Fatigue Attacks: How Attackers Bypass Multi-Factor Authentication

6 min read
Compliance

Phishing Simulation for Government Contractors: CMMC 2.0 Requirements

7 min read
Risk & ROI

Building a Security Awareness Metrics Dashboard Your CISO Will Love

5 min read
Culture & Training

Phishing Simulation for Remote and Hybrid Teams: Unique Challenges

6 min read
Threat Intelligence

Voice Phishing (Vishing) Simulation: Testing the Phone Attack Vector

6 min read
Compliance

GDPR Security Awareness Training: Requirements and Implementation Guide

6 min read
Industry Guide

Phishing Simulation for Universities and Schools: An Education Sector Guide

7 min read
Threat Intelligence

Business Email Compromise (BEC) Simulation: Testing for the Costliest Attack

7 min read
Risk & ROI

Reporting Phishing Simulation Results to the Board: A CISO's Template

5 min read
Industry Guide

GoPhish vs Commercial Phishing Platforms: When Free Costs More

6 min read