A new phishing campaign targeting Microsoft 365 login credentials has emerged, using QR codes as the primary attack vector. This campaign represents a sophisticated evolution in phishing tactics, blending social engineering and technical expertise to bypass traditional email security measures. Corporate users are the main target, capitalizing on the growing use of QR codes in business operations. Victims receive emails posing as official communications from Microsoft or IT departments, claiming users need to verify their accounts or that their passwords are expiring.
Instead of using suspicious URLs or attachments, the emails feature QR codes that recipients are instructed to scan with their mobile devices.
This approach circumvents email security systems that typically scan for malicious links or file attachments. Palo Alto Networks discovered this campaign in March 2025 and observed a notable uptick in QR code-based phishing attempts targeting enterprise users. Financial services and healthcare sectors have been particularly impacted, with attackers successfully stealing credentials from numerous organizations.
Upon scanning the QR code, victims are redirected to replica Microsoft 365 login pages designed to capture user credentials. These fake pages are meticulously crafted, with JavaScript implementations that validate email formats before submission. This adds an extra layer of realism, filtering out less sophisticated targets.
By making the login experience appear authentic, the attackers are able to increase their chances of harvesting valid credentials while evading detection.
The QR codes used in this campaign employ a complex redirection mechanism to avoid detection. Initially, the URLs lead to seemingly benign domains before redirecting victims to the phishing site. Technical analysis reveals the use of obfuscation techniques in the source code of the phishing pages. A function in the code validates email and password inputs, then exfiltrates the data to the attackers. After submitting credentials, victims are unknowingly redirected to legitimate Microsoft services, unaware that their accounts have been compromised.