Attachment: QR Code Link With Base64-Encoded Recipient Address
Detects when an image or macro attachment contains QR codes that, when scanned, lead to URLs containing the recipient's email address. This tactic is used to uniquely track or target specific recipients and serve tailored credential phishing pages.
Sublime rule (View on GitHub)
1name: "Attachment: QR Code Link With Base64-Encoded Recipient Address"
2description: "Detects when an image or macro attachment contains QR codes that, when scanned, lead to URLs containing the recipient's email address. This tactic is used to uniquely track or target specific recipients and serve tailored credential phishing pages."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and 1 of (
8 any(ml.nlu_classifier(subject.subject).intents,
9 .name == "cred_theft" and .confidence == "high"
10 ),
11 body.current_thread.text is null,
12 any($org_slds, strings.icontains(sender.display_name, .))
13 )
14 and any(attachments,
15 (.file_type in $file_types_images or .file_extension in $file_extensions_macros or .file_type == "pdf")
16 and any(file.explode(.),
17 any(recipients.to,
18 .email.domain.valid
19 and any(beta.scan_base64(..scan.qr.url.url, ignore_padding=true),
20 strings.icontains(., ..email.email)
21 )
22 )
23 )
24 )
25 and not profile.by_sender_email().any_false_positives
26 and not profile.by_sender_email().solicited
27
28attack_types:
29 - "Credential Phishing"
30tactics_and_techniques:
31 - "QR code"
32 - "Image as content"
33 - "Social engineering"
34 - "Evasion"
35 - "PDF"
36 - "Macros"
37detection_methods:
38 - "Computer Vision"
39 - "File analysis"
40 - "Natural Language Understanding"
41 - "QR code analysis"
42 - "Sender analysis"
43id: "927a0c1a-f136-56db-acfd-df47db6ec246"