BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Ghost Campaign Targets Developers, QR Code Phishing Hits 1.6M Users

Ghost Campaign Targets Developers, QR Code Phishing Hits 1.6M Users

March 27, 2026Data Breaches & Incidents3 min readmedium

Originally reported by Hackread

#phishing#malware#npm#qr-codes#social-engineering#cryptocurrency#supply-chain
Share

TL;DR

Researchers identified multiple sophisticated phishing campaigns this week, including a Ghost campaign using fake npm install logs to steal developer credentials and crypto wallets, plus a massive QR code campaign that bypassed email security controls to reach 1.6 million users.

Why medium?

Multiple active phishing campaigns targeting different vectors (npm packages and QR codes) represent ongoing threats, but no indication of critical infrastructure impact or widespread exploitation.

Threat Landscape Update: Multi-Vector Phishing Campaigns Target Developers and Enterprise Users

Security researchers uncovered several sophisticated phishing campaigns this week, demonstrating attackers' continued innovation in social engineering tactics across multiple attack vectors.

Ghost Campaign Exploits Developer Trust in npm Ecosystem

ReversingLabs researchers identified a new Ghost campaign leveraging fake npm install progress bars to harvest sudo passwords and cryptocurrency wallet credentials from developers. The campaign exploits developers' familiarity with package installation processes, displaying convincing fake terminal output during what appears to be legitimate npm operations.

The attack specifically targets the development workflow, waiting for moments when developers typically enter administrative credentials. Once sudo access is obtained, the malware pivots to cryptocurrency wallet theft, highlighting the dual financial and access motivations behind the campaign.

QR Code Campaign Evades Email Security Controls

7AI researchers documented the "Quish Splash" campaign, a massive QR code phishing operation that successfully bypassed SPF, DKIM, and DMARC protections to reach 1.6 million email recipients. The campaign leverages QR codes to redirect users to credential harvesting pages, exploiting the gap in traditional email security scanning capabilities for image-based threats.

The attack's scale and successful evasion of established email authentication mechanisms demonstrates the ongoing challenge of securing against image-based phishing vectors that don't trigger traditional content analysis.

PXA Stealer Targets Financial Sector

CyberProof researchers reported a 10% increase in PXA Stealer attacks against financial institutions during Q1 2026. The malware variant utilizes Telegram for data exfiltration, making detection and takedown more challenging through the use of legitimate communication platforms.

The targeting of financial institutions aligns with broader trends of credential theft operations focusing on high-value sectors where stolen access can yield significant returns for threat actors.

Security Tool Landscape Updates

Two industry analyses provided updated perspectives on enterprise security tooling. The first evaluated AI-powered security solutions from major vendors including Check Point, Palo Alto Networks, CrowdStrike, Fortinet, and Zscaler across cloud, endpoint, and network deployment scenarios.

Separately, a practitioner review examined Acalvio ShadowPlex's deception-based approach to preemptive threat detection across IT, cloud, and OT environments, highlighting the continued evolution of defensive technologies beyond traditional signature-based detection.

Sources

  • Ghost Campaign Uses Fake npm Progress Bars to Phish Sudo Passwords
  • Best AI Security Solutions for Enterprises in 2026
  • Quish Splash QR Code Phishing Campaign Hits 1.6 Million Users
  • New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data
  • Acalvio ShadowPlex Review: Deception-Based Preemptive Cybersecurity

Originally reported by Hackread

Tags

#phishing#malware#npm#qr-codes#social-engineering#cryptocurrency#supply-chain

Tracked Companies

🇦🇪Telegram

Related Intelligence

  • Steganography Strikes: Malware Hidden in Images Targets Enterprise Systems

    mediumFeb 23, 2026
  • Weekly Security Roundup: Teramind Phishing Campaign Targets Remote Workers

    mediumMar 2, 2026
  • Weekly Threat Roundup: npm Supply Chain Attacks, Mirai Evolution, and Router Security Policy

    highMar 26, 2026

Related Knowledge

  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir
  • Digital Forensics Artifacts — Deep Dive Reference

    dfir
  • CIPHER Incident Response Playbooks — Operational Reference

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Industry Roundup: Google's 2029 Quantum Deadline, EtherRAT Smart Contract C2, and Oracle WebLogic Under Attack