Accelerated by:


Copyright © 2025 Apollo Cybersecurity

In recent days, various cybersecurity media and firms have warned of a very significant increase in phishing with QR codes, a technique that has multiplied its volume and is already being used on a recurring basis against corporate environments. East computer attack, known as Quishing, takes advantage of an everyday and widely accepted element to provoke security breaches with direct impact on the enterprise IT security.
In this article we analyze what is happening, why are these types of attacks skyrocketing and what real risks does it entail for organizations.
According to information recently published by various specialized media, the campaigns of Phishing with QR codes has increased fivefold in recent months. Unlike traditional phishing, the malicious link does not appear visibly, but hidden inside a QR code which redirects to fraudulent pages.
These codes are being distributed primarily through:
The goal is usually the same: steal corporate credentials or personal data that allows subsequent access to business systems.
The growth of phishing with QR codes is no accident. It responds to several very clear factors:
When scanning a QR, the user usually does so from a personal device, which Break the usual controls and facilitates the success of the attack without raising immediate alerts.
In most cases, the flow of the attack is simple and effective:
A single compromised credential can quickly result in a Major security breach, especially if there is no multifactor authentication or abnormal access detection.
The rise of Quishing leaves several clear learnings for organizations:
To ignore this type of attack is to assume an unnecessary risk in a context where social engineering remains one of the most effective vectors.
Phishing with QR codes reinforces a known reality: cybersecurity must be addressed as a strategic priority, not just as a technical issue.
Reducing risk involves reviewing processes, training teams, extending protection to the mobile environment and improving early detection capacity. Failure to do so leaves open a door that attackers are already actively exploiting.
In Apolo Cybersecurity we help organizations to anticipate new attack vectors, such as phishing with QR codes, before they become real incidents.
We work on risk assessment, awareness adapted to current threats and the reinforcement of detection and response controls. Because the enterprise IT security it does not consist in reacting when the damage has already been done, but in reduce exposure and prepare before the attack occurs.
Contact Apolo Cybersecurity and strengthen your organization in the face of the threats that are already setting the cybersecurity agenda.
.webp)