179,000 organizations targeted in one campaign
Microsoft's Q1 2026 Email Threat Landscape report has identified QR code phishing, or "quishing," as the fastest-growing email threat vector. The volume of these attacks surged by 146% from January to March 2026, rising from 7.6 million to 18.7 million detections. Threat actors are evolving their tactics to bypass traditional email security gateways by embedding malicious QR codes within attachments, predominantly PDFs. This method obscures the malicious URL from content scanners. The report also notes a 125% increase in CAPTCHA-gated phishing attacks, which use legitimate CAPTCHA services to delay analysis by automated security tools. These evolving techniques underscore a continuous cat-and-mouse game where attackers rapidly innovate to maintain the effectiveness of phishing campaigns for credential theft.
The primary goal of these campaigns remains credential theft. The attack chain is simple yet effective:
This entire process leverages a gap between corporate email security and personal mobile device usage, making it a highly successful tactic.
The techniques used demonstrate an intelligent adaptation to modern defenses:
T1566.002 - Spearphishing Link. While traditionally a hyperlink, the QR code serves the exact same function, delivering the user to a malicious site.T1204.001 - Malicious Link) is a form of obfuscation to bypass security products, mapping to T1027 - Obfuscated Files or Information. The use of CAPTCHA gates is another advanced evasion technique.The primary impact is widespread credential compromise. Stolen Microsoft 365 or Google Workspace credentials can lead to Business Email Compromise (BEC), data breaches, and serve as a foothold for more severe attacks like ransomware. The use of mobile devices for the final step of the attack means that even organizations with robust endpoint protection on their laptops are vulnerable. The scale is massive, with one campaign alone targeting 179,000 organizations. The cost of remediation, including password resets, incident response, and user retraining, is substantial.
No specific technical indicators of compromise (IPs, hashes, domains) were provided in the source articles, as the report focused on trends.
File Analysis.M1017 - User Training.Educate users to be highly suspicious of QR codes in unexpected emails and to verify the source before scanning.
Utilize advanced email security solutions with image analysis/OCR to detect and block QR codes in attachments.
Implement phishing-resistant MFA (like FIDO2) to mitigate the impact of stolen credentials.
Start of Q1 2026, during which Microsoft observed a 146% increase in QR code phishing.
End of Q1 2026. QR code phishing messages reached 18.7 million in March.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.