2026-03-20 | Cybersecurity Threat Landscape | Oracle-42 Intelligence Research
```html

QR Code Phishing ("Quishing"): The Mobile Threat Vector Exploiting Human Trust and MFA Bypass

Executive Summary: QR code phishing—often dubbed "quishing"—has surged as a primary mobile threat vector in 2025, enabling adversaries to bypass multi-factor authentication (MFA) defenses through Adversary-in-the-Middle (AiTM) techniques. Unlike traditional phishing, quishing exploits the inherent trust in QR codes, directing users to malicious landing pages that harvest session tokens and credentials. This article examines the mechanics of AiTM-driven quishing, its integration with emerging phishing-as-a-service (PhaaS) ecosystems, and the technical mechanisms enabling MFA circumvention. With over a million PhaaS attacks observed in early 2025, quishing represents a rapidly evolving attack surface that demands immediate mitigation strategies.

Key Findings

Understanding QR Code Phishing (Quishing)

QR code phishing, or "quishing," is a social engineering tactic where attackers embed malicious URLs or payloads within QR codes. When scanned using a mobile device, these codes redirect users to counterfeit login portals or malicious websites. Unlike traditional phishing emails, quishing bypasses text-based spam filters and leverages the visual immediacy of QR codes—often presented in physical spaces such as parking lots, office lobbies, or event signage.

In 2025, quishing has evolved into a high-efficacy vector due to the ubiquitous use of QR codes in consumer and enterprise workflows. The attack surface is amplified on mobile platforms, where QR scanning is natively supported and often auto-triggers browser navigation without user confirmation.

Adversary-in-the-Middle (AiTM) Phishing: The Engine Behind Quishing Success

AiTM phishing is a sophisticated technique wherein attackers position themselves between the user and the intended service (e.g., Microsoft 365, Google Workspace). By hosting a malicious proxy server, adversaries intercept HTTPS traffic, capture login credentials, and harvest session cookies—critical artifacts that bypass MFA when replayed in authenticated sessions.

The integration of AiTM with quishing is particularly effective because:

This mechanism directly undermines organizations' MFA investments, as shown in recent campaigns where AiTM phishing led to high-profile breaches despite strong authentication policies.

Phishing-as-a-Service (PhaaS) and the Democratization of Quishing

Phishing-as-a-service platforms have evolved into full-spectrum cybercrime ecosystems, offering modular toolkits that include quishing templates, QR code generators, and AiTM proxy infrastructure. According to threat intelligence from March 2025, over one million PhaaS attacks were launched globally in the first two months of the year—a 300% increase over the same period in 2024.

These platforms provide:

The commoditization of quishing has lowered the barrier to entry, enabling rapid scaling of attacks and increasing the diversity of targets across sectors.

Mobile Threat Vector: Why QR Codes Are Ideal for Attackers

Mobile devices are the primary attack surface for quishing due to several inherent weaknesses:

These factors combine to create a low-friction path for credential harvesting and session hijacking, particularly in Bring-Your-Own-Device (BYOD) environments.

Technical Workflow of a Quishing AiTM Attack

A typical quishing AiTM attack unfolds in five stages:

  1. Lure Deployment: Attackers print malicious QR codes on stickers, posters, or digital displays in high-traffic areas (e.g., near office entrances or public Wi-Fi hotspots).
  2. Victim Scanning: Users scan the code with their mobile device, triggering an automatic redirect to a malicious landing page hosted on a phishing domain (e.g., "live-session[.]com").
  3. Proxy Interception: The landing page serves a reverse proxy that sits between the user and the legitimate service (e.g., Microsoft 365 login portal).
  4. Credential & Token Theft: As the user enters their credentials and MFA token, the proxy captures the session cookie and token in transit.
  5. Account Takeover: The attacker imports the stolen session cookie into their browser, bypassing MFA and gaining full access to the user's account.

This workflow demonstrates how quishing bypasses both traditional phishing defenses and MFA controls, enabling persistent, undetected access.

Recommendations for Organizations and Users

To mitigate the rising threat of quishing and AiTM phishing, organizations and individuals must adopt a defense-in-depth strategy:

For Organizations

For End Users