A 2026 Email Threats Report from Barracuda paints a grim picture of the current email threat landscape, where one in every three emails is either malicious or unwanted spam. The report, based on an analysis of over 3.1 billion emails, concludes that attackers are successfully industrializing their operations through the use of Artificial Intelligence and Phishing-as-a-Service (PhaaS) platforms. This has led to a surge in both the volume and sophistication of attacks. Key findings show a tactical pivot away from traditional malware attachments towards more evasive techniques, including URL-based attacks, malicious HTML attachments, and a novel trend of embedding QR codes in PDFs to deliver phishing links. With account takeovers remaining a persistent threat, the risk of attacks originating from internally compromised, trusted accounts is higher than ever.
The email threat landscape in 2026 is defined by scale, sophistication, and evasion. Phishing remains the top threat, accounting for 48% of all malicious emails.
The QR code-in-PDF technique is a prime example of the multi-stage, cross-platform attacks now being deployed.
T1566.001 - Phishing: Spearphishing Attachment: The use of PDF and HTML attachments to deliver the malicious payload or link.T1566.002 - Phishing: Spearphishing Link: The ultimate goal of the QR code is to get the user to a malicious link.T1204.002 - User Execution: Malicious File: The user must open the PDF and choose to scan the QR code for the attack to succeed.T1078 - Valid Accounts: The high rate of account takeover leads to attackers using legitimate, compromised accounts to launch further phishing campaigns.The impact of these evolved email threats is multifaceted. Successful credential phishing can lead to full-scale data breaches, financial fraud, and ransomware deployment. The high rate of account takeover creates a persistent internal threat that is difficult to eradicate. The QR code tactic not only bypasses security but also trains users to perform an insecure action, potentially leading to further compromises. The industrialization of these attacks means that organizations of all sizes are facing a constant, high-volume barrage of sophisticated threats, straining security teams and increasing the likelihood of a successful breach.
No specific Indicators of Compromise were provided in the source articles.
Security teams may want to hunt for the following patterns:
Detection:
Response:
Generative AI now fuels hyper-realistic phishing, with new 'device code phishing' techniques bypassing MFA, democratized by PhaaS kits like EvilTokens and Tycoon.
Train users to be suspicious of QR codes in emails and to verify unexpected requests for information through separate channels.
Use advanced email security gateways that can analyze and block malicious links, including those delivered via novel methods like QR codes.
Implement phishing-resistant MFA to protect accounts even if credentials are stolen.
Deploy email security solutions capable of sandboxing attachments and using techniques like OCR to detect threats within files.
To counter the QR code phishing tactic, organizations must enhance their File Analysis capabilities beyond simple signature matching. Modern email security gateways should be configured to perform deep analysis of attachments like PDFs. This includes implementing Optical Character Recognition (OCR) to convert images and scanned documents within the PDF into text. Once converted, the text can be scanned for keywords like 'QR code' or for URL patterns. When a QR code is detected, the system should extract the embedded URL and submit it to a URL analysis engine (like D3-UA) to check for malicious content or reputation. This multi-step, automated analysis within a sandbox environment is crucial for detecting and blocking these evasive threats before they reach the user's inbox.
With 34% of companies facing monthly account takeovers, Domain Account Monitoring is no longer optional. This technique involves using AI and behavioral analytics to detect compromised accounts. SIEM and Identity and Access Management (IAM) solutions should be configured to baseline normal user behavior and alert on anomalies. Key indicators of takeover include: impossible travel (logins from geographically distant locations in a short time), logins from unfamiliar devices or anonymizing proxies (Tor/VPN), multiple failed login attempts followed by a success from a new location, and post-login activities like the creation of malicious inbox rules (e.g., 'forward all mail to external address' or 'delete all mail with 'invoice' in the subject'). By detecting and responding to these signals in near real-time, security teams can lock down compromised accounts before they are used to launch devastating internal phishing campaigns.
The most effective single defense against the consequences of credential phishing is the universal enforcement of phishing-resistant Multi-factor Authentication. While any MFA is better than none, organizations should aggressively move away from easily phishable factors like SMS and one-time password (OTP) apps. The gold standard is FIDO2/WebAuthn, which uses public-key cryptography and is bound to the specific website, making it impossible for a user to accidentally approve a login on a fake phishing site. Implementing phishing-resistant MFA breaks the entire credential theft lifecycle. Even if a user is tricked by a QR code and enters their username and password on a fake site, the attacker cannot complete the login without the physical security key, rendering the stolen credentials useless.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.