Barracuda Report: One in Three Emails is Malicious as Attackers Leverage AI, QR Codes, and Phishing-as-a-Service

Email Under Siege: AI, QR Codes, and Phishing-as-a-Service Fuel Surge in Attacks

HIGH
May 12, 2026
May 21, 2026
6m read
PhishingThreat IntelligenceMalware

Related Entities(initial)

Organizations

Products & Tech

Phishing-as-a-Service (PhaaS)Artificial Intelligence

Full Report(when first published)

Executive Summary

A 2026 Email Threats Report from Barracuda paints a grim picture of the current email threat landscape, where one in every three emails is either malicious or unwanted spam. The report, based on an analysis of over 3.1 billion emails, concludes that attackers are successfully industrializing their operations through the use of Artificial Intelligence and Phishing-as-a-Service (PhaaS) platforms. This has led to a surge in both the volume and sophistication of attacks. Key findings show a tactical pivot away from traditional malware attachments towards more evasive techniques, including URL-based attacks, malicious HTML attachments, and a novel trend of embedding QR codes in PDFs to deliver phishing links. With account takeovers remaining a persistent threat, the risk of attacks originating from internally compromised, trusted accounts is higher than ever.

Threat Overview

The email threat landscape in 2026 is defined by scale, sophistication, and evasion. Phishing remains the top threat, accounting for 48% of all malicious emails.

  • Industrialization of Attacks: The combination of AI and PhaaS is a force multiplier for criminals. AI is used to craft highly convincing, personalized social engineering lures at scale, while PhaaS platforms provide the infrastructure, templates, and management for launching widespread campaigns. The report found that 90% of high-volume phishing campaigns utilized PhaaS kits.
  • Evasive Delivery Tactics: Threat actors are actively working to bypass traditional email security gateways. Instead of attaching malware directly, they are using:
    • URL-based attacks: Links to malicious sites.
    • HTML attachments: These attachments can contain obfuscated scripts or redirectors that execute in the browser.
    • QR Codes in PDFs: This is a particularly clever technique. A PDF is often considered a 'safe' file type. Attackers embed a QR code inside the PDF. When the user scans the code with their phone, it takes them to a phishing website on their mobile device, completely bypassing the security controls of the corporate desktop and network.
  • Account Takeover (ATO): The report highlights that 34% of companies experience at least one account compromise each month. Once an attacker controls a legitimate mailbox, they can use it to send highly targeted and convincing phishing emails to that person's colleagues, partners, and customers, leveraging the implicit trust associated with the sender's identity.

Technical Analysis

The QR code-in-PDF technique is a prime example of the multi-stage, cross-platform attacks now being deployed.

  1. Delivery: A user receives an email with a PDF attachment. The email and PDF may appear to be a legitimate invoice, receipt, or secure document notification.
  2. Obfuscation: The email security gateway scans the PDF, finds no executable code or known malicious signatures, and allows it through.
  3. Social Engineering: The PDF contains a QR code with a message like "Scan to view your secure document" or "Scan to complete 2FA verification."
  4. Execution: The user scans the QR code with their mobile phone.
  5. Compromise: The phone's browser opens a link to a credential harvesting page controlled by the attacker. The user, now on a different device, may be less suspicious and enter their credentials.

MITRE ATT&CK Techniques

Impact Assessment

The impact of these evolved email threats is multifaceted. Successful credential phishing can lead to full-scale data breaches, financial fraud, and ransomware deployment. The high rate of account takeover creates a persistent internal threat that is difficult to eradicate. The QR code tactic not only bypasses security but also trains users to perform an insecure action, potentially leading to further compromises. The industrialization of these attacks means that organizations of all sizes are facing a constant, high-volume barrage of sophisticated threats, straining security teams and increasing the likelihood of a successful breach.

IOCs — Directly from Articles

No specific Indicators of Compromise were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns:

  • Email Attachments: Use email gateway logs or tools to search for emails containing PDF attachments that also have keywords like "QR code," "scan," or "verify" in the email body or attachment name.
  • Optical Character Recognition (OCR): More advanced security gateways with OCR capabilities can be configured to scan the content of images and PDFs for the presence of QR codes and flag them for review.
  • Web Proxy Logs: Correlate email receipt with mobile device traffic. Look for users who received a suspicious PDF and shortly after visited a newly-registered or uncategorized domain from their mobile device via the corporate Wi-Fi.

Detection & Response

  • Detection:

    • Advanced Email Security: Deploy an email security solution that uses computer vision and OCR to detect QR codes within attachments. The solution should also have robust sandboxing for HTML and URL analysis. This aligns with D3FEND File Analysis (D3-FA).
    • Account Takeover Protection: Use AI-based tools that can analyze login behavior (location, time, device) and internal email traffic to detect anomalies indicative of a compromised account.
    • User Training: Conduct continuous security awareness training that specifically addresses modern threats like QR code phishing. Use phishing simulations to test and reinforce this training.
  • Response:

    • If a user reports a QR code phishing email, use that intelligence to search for and quarantine all similar emails across the organization.
    • If an account is suspected of being compromised, immediately reset the user's password, invalidate all active sessions, and review all actions taken by the account (e.g., sent emails, file access, rule creation).

Mitigation

  • Multi-Factor Authentication (MFA): Enforce phishing-resistant MFA (like FIDO2) across the entire organization to mitigate the impact of credential theft. This is a foundational control, part of D3FEND Multi-factor Authentication (D3-MFA).
  • Zero Trust Architecture: Do not implicitly trust emails, even if they come from an internal source. All requests for sensitive information or actions should be independently verified through a separate communication channel.
  • Email Gateway Hardening: Configure email security gateways to block HTML attachments from external senders if they are not required for business operations. Implement policies to flag or quarantine emails containing QR codes.
  • Mobile Device Management (MDM): Use MDM solutions to enforce security policies on mobile devices, including the use of threat defense solutions that can block access to known phishing sites.

Timeline of Events

1
May 12, 2026
This article was published

Article Updates

May 21, 2026

Generative AI now fuels hyper-realistic phishing, with new 'device code phishing' techniques bypassing MFA, democratized by PhaaS kits like EvilTokens and Tycoon.

MITRE ATT&CK Mitigations

Train users to be suspicious of QR codes in emails and to verify unexpected requests for information through separate channels.

Use advanced email security gateways that can analyze and block malicious links, including those delivered via novel methods like QR codes.

Implement phishing-resistant MFA to protect accounts even if credentials are stolen.

Deploy email security solutions capable of sandboxing attachments and using techniques like OCR to detect threats within files.

D3FEND Defensive Countermeasures

To counter the QR code phishing tactic, organizations must enhance their File Analysis capabilities beyond simple signature matching. Modern email security gateways should be configured to perform deep analysis of attachments like PDFs. This includes implementing Optical Character Recognition (OCR) to convert images and scanned documents within the PDF into text. Once converted, the text can be scanned for keywords like 'QR code' or for URL patterns. When a QR code is detected, the system should extract the embedded URL and submit it to a URL analysis engine (like D3-UA) to check for malicious content or reputation. This multi-step, automated analysis within a sandbox environment is crucial for detecting and blocking these evasive threats before they reach the user's inbox.

With 34% of companies facing monthly account takeovers, Domain Account Monitoring is no longer optional. This technique involves using AI and behavioral analytics to detect compromised accounts. SIEM and Identity and Access Management (IAM) solutions should be configured to baseline normal user behavior and alert on anomalies. Key indicators of takeover include: impossible travel (logins from geographically distant locations in a short time), logins from unfamiliar devices or anonymizing proxies (Tor/VPN), multiple failed login attempts followed by a success from a new location, and post-login activities like the creation of malicious inbox rules (e.g., 'forward all mail to external address' or 'delete all mail with 'invoice' in the subject'). By detecting and responding to these signals in near real-time, security teams can lock down compromised accounts before they are used to launch devastating internal phishing campaigns.

The most effective single defense against the consequences of credential phishing is the universal enforcement of phishing-resistant Multi-factor Authentication. While any MFA is better than none, organizations should aggressively move away from easily phishable factors like SMS and one-time password (OTP) apps. The gold standard is FIDO2/WebAuthn, which uses public-key cryptography and is bound to the specific website, making it impossible for a user to accidentally approve a login on a fake phishing site. Implementing phishing-resistant MFA breaks the entire credential theft lifecycle. Even if a user is tricked by a QR code and enters their username and password on a fake site, the attacker cannot complete the login without the physical security key, rendering the stolen credentials useless.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingEmail SecurityBarracudaArtificial IntelligenceQR CodePhaaSAccount Takeover

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.