公式動画ピックアップ
AAPL
ADBE
ADSK
AIG
AMGN
AMZN
BABA
BAC
BL
BOX
C
CHGG
CLDR
COKE
COUP
CRM
CROX
DDOG
DELL
DIS
DOCU
DOMO
ESTC
F
FIVN
GILD
GRUB
GS
GSK
H
HD
HON
HPE
HSBC
IBM
INST
INTC
INTU
IRBT
JCOM
JNJ
JPM
LLY
LMT
M
MA
MCD
MDB
MGM
MMM
MSFT
MSI
NCR
NEM
NEWR
NFLX
NKE
NOW
NTNX
NVDA
NYT
OKTA
ORCL
PD
PG
PLAN
PS
RHT
RNG
SAP
SBUX
SHOP
SMAR
SPLK
SQ
TDOC
TEAM
TSLA
TWOU
TWTR
TXN
UA
UAL
UL
UTX
V
VEEV
VZ
WDAY
WFC
WK
WMT
WORK
YELP
ZEN
ZM
ZS
ZUO
公式動画&関連する動画 [From Personal Phone to Corporate Breach: The QR Code Security Gap]
QR codes were built for convenience… and that’s exactly why attackers love them. In this episode of CISO Unscripted, Mitch Mayne (Unit 42) sits down with Diva Oriane Marty, Senior Web Security Researcher at Palo Alto Networks, to unpack what Unit 42 is seeing in the wild—including 11,000+ malicious QR codes every day.
This isn’t just “scan a code, land on a phishing page” anymore. Diva breaks down how modern QR attacks use in-app deep links to bypass the browser entirely, trigger actions inside trusted apps, and exploit the reality that most scans happen on personal mobile devices—outside typical enterprise visibility. We also dig into a particularly nasty scenario: a user scans a QR code on their phone, unknowingly adds a malicious calendar invite, then later opens it on a corporate laptop… creating a clean path into corporate systems.
From direct APK downloads that sidestep app store protections to highly targeted campaigns, this conversation is packed with practical takeaways for security leaders who want real guardrails—not just “be careful” training.
Timecodes:
00:00 How a personal-phone QR scan can become a corporate compromise path
00:37 Welcome to CISO Unscripted + why this discussion is grounded in Unit 42 investigations
01:03 Why QR codes are so attractive to attackers (and what happens after the scan)
01:16 The scale: Unit 42 seeing 11,000+ malicious QR codes per day
01:26 Beyond phishing: QR-triggered logins, payments, and software downloads
02:17 Meet Diva Oriane Marty (Senior Web Security Researcher, Palo Alto Networks)
02:44 Moving beyond the web link: what “in-app deep links” are
03:19 Deep links explained (and how they reduce friction for attackers)
04:12 The enterprise blind spot: why personal devices are the soft underbelly
04:41 Calendar/contacts manipulation: how QR codes can quietly set up the next-stage attack
05:31 “That’s creepy”: How easy your calendar can be compromised with a “Zoom meeting” invite
06:07 QR codes distributing direct APK downloads (and why that bypasses app store safety)
06:41 What an APK is and why “don’t do that” isn’t a sufficient control strategy
07:12 Practical guardrails: scanning/analyzing QR codes on web pages to block malicious hosting
07:51 The human problem: cyber hygiene vs. reality (people still scan)
08:22 How mobile OS flows can nudge users into installing risky downloads
09:03 The geopolitical angle: targeted campaigns and messaging-app takeovers
09:35 Signal-focused attacks in the Russia–Ukraine context (what the research found)
10:02 References to reporting from CERT-UA and Google Threat Intelligence Group
10:23 The real trend: compromising messenger/social media accounts (criminal and state-aligned)
10:48 Where to find the full report + closing thoughts
176
8