
SANS Internet StormCast
The latest Stormcast episode highlights a novel phishing vector that disguises QR codes inside HTML tables. By rendering the code as a distorted table, attackers evade traditional email scanners that flag image‑based QR payloads. Recipients scan the code with mobile devices, bypassing corporate web gateways and delivering malicious URLs or credential‑harvesting pages. This technique exploits the resilience of QR symbols to visual distortion and leverages the growing habit of using smartphones for quick scans, making it a potent out‑of‑band attack for enterprises with lax mobile‑device policies.
The discussion then turns to critical flaws in the automation platform n8n, where four vulnerabilities—including an unauthenticated code‑execution path—allow malicious file uploads to run arbitrary commands. Although n8n isolates workflows in sandboxes, the separation between untrusted data and AI‑generated prompts is insufficient, exposing on‑premise and cloud deployments to remote code execution. A related issue in Unify Protect demonstrates a JSON‑network discovery flaw that requires an attacker on the same subnet, but still underscores the need for timely patching and automatic update configurations across all endpoint security solutions.
Finally, the episode warns that power banks are evolving from simple chargers into feature‑rich IoT devices with Wi‑Fi hotspots, touch screens, and firmware update capabilities. This added connectivity expands the attack surface, allowing remote compromise or data exfiltration through poorly secured embedded web servers. Organizations purchasing such accessories should evaluate the necessity of each feature, prefer models with minimal network exposure, and enforce strict inventory controls. As prices rise with added functionality, the cost‑benefit analysis must include potential security liabilities, reinforcing the broader principle of limiting unnecessary IoT complexity in corporate environments.
A phishing campaign with QR codes rendered using an HTML table
https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606
https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
https://www.theverge.com/tech/856225/power-banks-are-the-latest-victims-of-feature-creep
Comments
Want to join the conversation?
Loading comments...