- I'm taking these 4 gadgets to the pool this summer - and why they make such a big difference
- '코트 안팎에서 데이터와 AI 활용하기'··· NBA팀 올랜도 매직의 디지털 여정
- 로봇 개와 AI 플랫폼의 만남···보스턴다이내믹스, 공장 관리 혁신 사례 공개
- 패브릭에서 데이터-AI 통합 중인 MS··· 그 이유는?
- Phone theft is on the rise - 7 ways to protect your device before it's too late
New Generation of Malicious QR Codes Uncovered by Researchers

A new generation of QR code phishing (quishing) attacks have been uncovered by threat analyists at Barracuda.
Research by the email protection firm highlighted new techniques that have been designed to evade traditional security defenses by including QR codes built from text-based ASCII/Unicode characters rather than the standard static image.
This tactic is designed to evade optical character recognition (OCR)-based defenses. In an email, it will look like a traditional QR code. To a typical OCR detection system, it appears meaningless.
Another technique sees the use of binary large object universal resource identifiers (URIs) to create hard-to-detect phishing pages.
Blob URIs allow web developers to work with binary data like images, videos or files directly within the browser, without having to send or retrieve it from an external server, Barracuda explained in a blog.
Because Blob URIs don’t load data from external URLs, traditional URL filtering and scanning tools may not initially recognize the content as malicious.
Blob URIs can also be difficult to track and analyze because they are created dynamically and can expire quickly.
The threat analysts have not seen any examples of the two techniques used at the same time.
“In traditional QR code attacks, the threat actors embed malicious links into the QR code. Security tools scan the image for known malicious links and block them,” explained Ashitosh Deshnur, Threat Analyst, Barracuda. “The new generation of QR code phishing techniques try to get around this by either making it impossible for image-based security scanning tools to read the QR code, or by making it harder for detection systems to identify and block malicious content.”
In 2023, Barracuda research showed that around 1 in 20 mailboxes were targeted with QR code attacks in the last quarter of the year.