A sophisticated phishing technique known as "quishing" (QR code phishing) is being deployed against bank customers in France. This novel campaign combines physical mail with digital fraud to enhance its legitimacy and bypass email-based security controls. Victims receive a convincing letter and a high-quality counterfeit bank card via traditional mail. A QR code included in the letter, when scanned, leads to a credential harvesting website masquerading as the bank's official portal. This hybrid approach represents a significant evolution in social engineering tactics, preying on the trust associated with physical mail and tangible objects like bank cards.
The "quishing" campaign is a multi-stage social engineering attack designed to steal banking credentials and personal data. Its effectiveness lies in its departure from typical email-based phishing.
Attack Chain:
T1566.001 - Phishing: Spearphishing Attachment, where the QR code acts as the malicious 'link'.This method is particularly dangerous because it completely bypasses email security gateways, which are designed to detect malicious links and attachments. It relies on exploiting human trust in physical mail.
The technical components of this attack are straightforward but effective when combined with the physical lure.
The primary impact is financial loss for the victims. Once attackers have the banking credentials, they can drain accounts, apply for loans, or make fraudulent purchases. The theft of additional personal information can lead to broader identity theft. For the banks, these incidents erode customer trust and can lead to significant costs associated with reimbursing fraud victims and managing the incident response.
Defense against this threat relies heavily on user awareness and vigilance.
.xyz, .club instead of .fr or .com), or domains that are close but not identical to the real bank's name.Education is the primary mitigation strategy.
M1032 - Multi-factor Authentication.M1017 - User Training.The most effective mitigation is to educate users to be suspicious of unsolicited communications, regardless of the medium, and to verify URLs before entering credentials.
Even if credentials are stolen, MFA can prevent unauthorized access to the bank account.
Mapped D3FEND Techniques:
The primary defense against this 'quishing' scam at the point of attack is rigorous URL analysis by the end-user. After scanning the QR code, users must be trained to carefully inspect the URL displayed in their mobile browser before taking any action. They should look for common signs of phishing, such as typos in the bank's name (e.g., 'banque-populaire' vs. 'banq-populaire'), the use of non-standard top-level domains (.xyz, .club), or the absence of HTTPS (no padlock icon). Banks should reinforce this in their security awareness campaigns, teaching customers that the authenticity of the physical card and letter is irrelevant if the digital destination is fraudulent. This user-centric analysis is the last line of defense.
As a critical safety net, all bank customers should have multi-factor authentication enabled on their accounts, preferably through an authenticator app or a physical token rather than SMS. Even if a user is successfully deceived by the 'quishing' attack and enters their username and password on the fraudulent site, the attackers will still be unable to access the account without the second factor. This countermeasure effectively stops the attack from progressing to financial theft, turning a successful credential harvesting attempt into a failed login. Banks must continue to push for 100% MFA adoption among their user base.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats