{"id":447,"date":"2026-01-07T10:03:05","date_gmt":"2026-01-07T10:03:05","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/"},"modified":"2026-01-07T10:03:05","modified_gmt":"2026-01-07T10:03:05","slug":"a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/","title":{"rendered":"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)"},"content":{"rendered":"<div>\n<p>Malicious use of QR codes has long been ubiquitous, both in the real world as well as in electronic communication. This is hardly surprising given that a scan of a QR code can lead one to a phishing page as easily as clicking a link in an e-mail.<\/p>\n<p>No more surprising is that vendors of security technologies have, over time, developed mechanisms for detecting and analyzing images containing QR codes that are included in e-mail messages[<a href=\"https:\/\/www.proofpoint.com\/us\/blog\/email-and-cloud-threats\/malicious-qr-code-detection-takes-giant-leap-forward\">1<\/a>,<a href=\"https:\/\/www.cloudflare.com\/learning\/security\/what-is-quishing\/\">2<\/a>]. These security mechanisms make QR code-based phishing less viable. However, due to the \u201ccat and mouse\u201d nature of cybersecurity, threat actors continually search for ways of bypassing various security controls, and one technique that can be effective in bypassing QR code detection and analysis in e-mail messages was demonstrated quite well in a recent string of phishing messages which made it into our inbox.<\/p>\n<p>The technique in question is based on the use of imageless QR codes rendered with the help of an HTML table. While it is not new by any stretch[<a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Adversary%20Vilage%20-%20Melvin%20Langvik%20-%20Evading%20Modern%20Defenses%20When%20Phishing%20with%20Pixels.pdf\">3<\/a>], it is not too well-known, and I therefore consider it worthy of at least this short post.<\/p>\n<p>Samples of the aforementioned phishing messages I have access to have been sent out between December 22nd and December 26th, and all of them had the same basic layout consisting of only a few lines of text along with the QR code.<\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\" style=\"border-width: 1px; border-style: solid; width: 801px; height: 273px;\"><\/a><\/p>\n<p>Although it looks quite normal (except perhaps for being a little \u201csquished\u201d), the QR code itself was \u2013 as we have indicated above \u2013 displayed not using an image but rather with the help of an HTML table made up of cells with black and white background colors, as you can see from the following code.<\/p>\n<pre>\n<code class=\"language-html\">&lt;table role=\"presentation\" border=\"0\" cellpadding=\"0\" cellspacing=\"0\" width=\"180\" height=\"180\" align=\"center\"&gt;\n\t&lt;tr height=\"4\"&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#FFFFFF\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t&lt;td width=\"4\" height=\"4\" bgcolor=\"#000000\"&gt;&lt;\/td&gt;\n\t\t...<\/code><\/pre>\n<p>Links encoded in all QR codes pointed to subdomains of the domain lidoustoo[.]click, and except for the very first sample from December 22nd, which pointed to onedrive[.]lidoustoo[.]click, all the URLs had the following structure:<\/p>\n<pre>\n<code>hxxps[:]\/\/&lt;domain from recipient e-mail&gt;&lt;decimal or hexadecimal string&gt;[.]lidoustoo[.]click\/&lt;alphanumeric string&gt;\/$&lt;recipient e-mail&gt;<\/code><\/pre>\n<p>While the underlying technique of rendering QR codes using HTML tables is \u2013 as we\u2019ve mentioned \u2013 not new, its appearance in a real-world phishing campaign is a useful reminder that many defensive controls still implicitly rely on assumptions about how malicious content is represented\u2026 And these assumptions might not always be correct.<\/p>\n<p>It is also a good reminder that purely technical security controls can never stop all potentially malicious content \u2013 especially content that has a socio-technical dimension \u2013 and that even in 2026, we will have to continue improving not just the technical side of security, but also user awareness of current threat landscape.<\/p>\n<p>[1] <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/email-and-cloud-threats\/malicious-qr-code-detection-takes-giant-leap-forward\">https:\/\/www.proofpoint.com\/us\/blog\/email-and-cloud-threats\/malicious-qr-code-detection-takes-giant-leap-forward<\/a><br \/>\n[2] <a href=\"https:\/\/www.cloudflare.com\/learning\/security\/what-is-quishing\/\">https:\/\/www.cloudflare.com\/learning\/security\/what-is-quishing\/<\/a><br \/>\n[3] <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Adversary%20Vilage%20-%20Melvin%20Langvik%20-%20Evading%20Modern%20Defenses%20When%20Phishing%20with%20Pixels.pdf\">https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Adversary%20Vilage%20-%20Melvin%20Langvik%20-%20Evading%20Modern%20Defenses%20When%20Phishing%20with%20Pixels.pdf<\/a><\/p>\n<p>&#8212;&#8212;&#8212;&#8211;<br \/>\nJan Kopriva<br \/>\n<a href=\"https:\/\/www.linkedin.com\/in\/jan-kopriva\/\">LinkedIn<\/a><br \/>\n<a href=\"https:\/\/www.nettles.cz\/\">Nettles Consulting<\/a><\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Malicious use of QR codes has long been ubiquitous, both in the real world as well as in electronic communication. This is hardly surprising given that a scan of a QR code can lead one to a phishing page as easily as clicking a link in an e-mail. No more surprising is that vendors of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-447","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Malicious use of QR codes has long been ubiquitous, both in the real world as well as in electronic communication. This is hardly surprising given that a scan of a QR code can lead one to a phishing page as easily as clicking a link in an e-mail. No more surprising is that vendors of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-07T10:03:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)\",\"datePublished\":\"2026-01-07T10:03:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\"},\"wordCount\":497,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\",\"name\":\"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\",\"datePublished\":\"2026-01-07T10:03:05+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage\",\"url\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\",\"contentUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/","og_locale":"en_US","og_type":"article","og_title":"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th) - Imperative Business Ventures Limited","og_description":"Malicious use of QR codes has long been ubiquitous, both in the real world as well as in electronic communication. This is hardly surprising given that a scan of a QR code can lead one to a phishing page as easily as clicking a link in an e-mail. No more surprising is that vendors of [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-01-07T10:03:05+00:00","og_image":[{"url":"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)","datePublished":"2026-01-07T10:03:05+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/"},"wordCount":497,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/","name":"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png","datePublished":"2026-01-07T10:03:05+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#primaryimage","url":"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png","contentUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/26-01-07-message.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/07\/a-phishing-campaign-with-qr-codes-rendered-using-an-html-table-wed-jan-7th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=447"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/447\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}