A new QR code phishing campaign is exploiting Microsoft Sway to target Microsoft 365 credentials, showcasing a troubling misuse of legitimate cloud-based tools. Researchers have identified that attackers are leveraging Sway, a platform for creating presentations and documents, to host counterfeit pages that display malicious QR codes. When users scan these codes, they are redirected to phishing websites designed to capture their Microsoft 365 login credentials. This method benefits from the inherent trust users place in Microsoft’s applications, making the phishing attempt more convincing and increasing the likelihood of credential theft.
The campaign has seen a dramatic increase in activity, with a 2,000-fold rise in traffic to the phishing pages observed since July 2024. Targeted sectors include technology, manufacturing, and finance, with a significant focus on users in Asia and North America. The attackers have employed sophisticated techniques, including adversary-in-the-middle (AitM) phishing tactics to intercept not only login credentials but also two-factor authentication (2FA) codes. This dual-layered approach further complicates defenses and enhances the effectiveness of the phishing scheme.
A notable challenge for defenders is the use of QR codes, which embed URLs within images, making them difficult to detect with traditional email scanners that analyze text content. Additionally, many victims scan these codes using mobile devices, which typically have less robust security measures compared to desktop systems. This gap in mobile security makes users more vulnerable to attacks, further increasing the risk of credential theft.
This latest campaign follows a similar phishing attack in April 2020, where Microsoft Sway was used to compromise corporate email accounts. As phishing tactics continue to evolve, attackers are now employing innovative methods such as Unicode QR codes to bypass conventional security measures. This adaptation highlights the ongoing battle between cybersecurity experts and threat actors, underscoring the need for continued vigilance and advanced protective measures to combat such sophisticated phishing techniques.
Reference: