CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Alerts

Phishing Campaign Abuses QR Codes to Steal Credit Card Details

December 26, 2022
Reading Time: 2 mins read
in Alerts

 

On 25 November, HP spotted a campaign that distributed Office documents through email. Notably, the documents did not contain any exploit or macro code that could execute malicious code. Instead, the documents only contained Chinese text and a QR code.

They suspected the attackers might be trying to distribute mobile malware by forcing the recipients of these documents to switch to mobile devices to access malicious content.

First, the attackers send the document with the QR code to targets as email attachments. The document claims recipients are entitled to a government grant for the fourth quarter of 2022 based on a decision made by the Chinese Ministry of Finance and other state institutions. The document emphasizes that the notice had been communicated the previous week to build a sense of urgency, urging recipients to act quickly.

Various state institutions, copyrights and security numbers are also mentioned to bolster the document’s credibility. So far, the lure meets all the classic elements of a good phishing lure: relying on authority, urgency and offering a financial incentive for taking action.

To receive the grant, the recipient is asked to scan the QR code using WeChat, a popular instant messaging, social media and mobile payment app, and then follow the instructions on the website. Using QR codes is an unusual but effective way to force the target to switch from a computer to a mobile device, which may be protected by weaker phishing protection and detection mechanisms.

When the recipient scans the QR code, they are first taken to a webpage containing the same information as in the Word document. Clicking a button enables the user to start the application for the grant. Next, the website asks for a bank card number. In the input field, there is a note that bank cards from the Industrial and Commercial Bank of China would be given priority. This notice suggests the attackers are primarily interested in such bank cards.

READ FULL ARTICLE

Tags: AlertsAlerts 2022ChinaDecember 2022Financial dataIndustrial and Commercial Bank of ChinaOfficePhishing CampaignQR code
0
VIEWS
ADVERTISEMENT

Related Posts

Flaw exposes 100 Lexmark printer models to hack

Flaw exposes 100 Lexmark printer models to hack

January 27, 2023
CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software

CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software

January 26, 2023
CISA Releases Eight Industrial Control Systems Advisories

CISA Releases Eight Industrial Control Systems Advisories

January 26, 2023
Trellix automates patching for 62,000 open-source projects

Trellix automates patching for 62,000 open-source projects

January 26, 2023

More Articles

Incidents

OldGremlin Ransomware Targeted Over a Dozen Russian Entities

October 21, 2022

Story from News Japan’s Liquid Global Exchange Hacked; $90M in Crypto Siphoned Off

August 19, 2021
Book

PCI DSS A Complete Guide – 2021 Edition

May 17, 2022

ShadowTalk Threat Intelligence

June 30, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.