EXPLORE
← Back to Explore
sublimehighRule

Attachment: QR code link with base64-encoded recipient address

Detects when an image or macro attachment contains QR codes that, when scanned, lead to URLs containing the recipient's email address. This tactic is used to uniquely track or target specific recipients and serve tailored credential phishing pages.

MITRE ATT&CK

initial-accessdefense-evasionexecution

Detection Query

type.inbound
and 1 of (
  any(ml.nlu_classifier(subject.subject).intents,
      .name == "cred_theft" and .confidence == "high"
  ),
  body.current_thread.text is null,
  any($org_slds, strings.icontains(sender.display_name, .))
)
and any(attachments,
        (
          .file_type in $file_types_images
          or .file_extension in $file_extensions_macros
          or .file_type == "pdf"
        )
        and any(file.explode(.),
                any(recipients.to,
                    .email.domain.valid
                    and any(beta.scan_base64(..scan.qr.url.url,
                                             format="url",
                                             ignore_padding=true
                            ),
                            strings.icontains(., ..email.email)
                    )
                )
        )
)
and not profile.by_sender_email().any_messages_benign
and not profile.by_sender_email().solicited

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Attachment: QR code link with base64-encoded recipient address"
description: "Detects when an image or macro attachment contains QR codes that, when scanned, lead to URLs containing the recipient's email address. This tactic is used to uniquely track or target specific recipients and serve tailored credential phishing pages."
type: "rule"
severity: "high"
source: |
  type.inbound
  and 1 of (
    any(ml.nlu_classifier(subject.subject).intents,
        .name == "cred_theft" and .confidence == "high"
    ),
    body.current_thread.text is null,
    any($org_slds, strings.icontains(sender.display_name, .))
  )
  and any(attachments,
          (
            .file_type in $file_types_images
            or .file_extension in $file_extensions_macros
            or .file_type == "pdf"
          )
          and any(file.explode(.),
                  any(recipients.to,
                      .email.domain.valid
                      and any(beta.scan_base64(..scan.qr.url.url,
                                               format="url",
                                               ignore_padding=true
                              ),
                              strings.icontains(., ..email.email)
                      )
                  )
          )
  )
  and not profile.by_sender_email().any_messages_benign
  and not profile.by_sender_email().solicited
attack_types:
  - "Credential Phishing"
tactics_and_techniques:
  - "QR code"
  - "Image as content"
  - "Social engineering"
  - "Evasion"
  - "PDF"
  - "Macros"
detection_methods:
  - "Computer Vision"
  - "File analysis"
  - "Natural Language Understanding"
  - "QR code analysis"
  - "Sender analysis"
id: "927a0c1a-f136-56db-acfd-df47db6ec246"