This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials

Updated on August 30, 2024

2 Min Read

Cybersecurity researchers have uncovered a new QR code phishing campaign, also known as quishing, that exploits Microsoft Sway to host fake pages, highlighting the continued abuse of legitimate cloud platforms for malicious purposes. This campaign primarily targets users in Asia and North America, with the technology, manufacturing, and finance sectors being the most affected.

The attackers leverage Microsoft Sway, a cloud-based tool within the Microsoft 365 suite, to create seemingly legitimate pages that prompt users to scan bogus QR codes. These codes redirect victims to phishing websites designed to steal their Microsoft 365 credentials. The use of Sway enhances the campaign’s credibility, especially since many users are already logged into their Microsoft accounts when accessing these pages.


Notably, this campaign has seen a dramatic 2,000-fold increase in traffic to unique Microsoft Sway phishing pages since July 2024. To further evade detection, some campaigns have employed Cloudflare Turnstile to obscure domains from static URL scanners and have used adversary-in-the-middle (AitM) phishing tactics to intercept credentials and two-factor authentication (2FA) codes.

Jan Michael Alcantara of Netskope Threat Labs noted that the use of QR codes poses significant challenges to defenders, as the URL is embedded within an image, bypassing many text-based email scanners. Additionally, victims are often more vulnerable when scanning QR codes with mobile devices, which typically have less stringent security measures than desktops or laptops.

This isn’t the first time Microsoft Sway has been abused in phishing campaigns. In April 2020, a campaign dubbed PerSwaysion successfully compromised corporate email accounts of high-ranking officials by redirecting them to credential-harvesting sites via Sway.

As quishing campaigns grow more sophisticated, attackers have even started crafting QR codes using Unicode text characters instead of images, a technique that challenges conventional security measures by bypassing detections designed for suspicious images, said SlashNext CTO J. Stephen Kowski.

This evolving threat underscores the need for heightened vigilance and robust security measures in defending against phishing attacks.

Stay alert and ensure your systems and protocols are up to date to counter these sophisticated threats.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Sandhya Goswami

Sandhya is a contributing author at Cloudways, specializing in content promotion and performance analysis. With a strong analytical approach and a keen ability to leverage data-driven insights, Sandhya excels in measuring the success of organic marketing initiatives.

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour