Friday, 5 December 2025
28.3 C
Singapore
25.4 C
Thailand
25.8 C
Indonesia
27.1 C
Philippines

QR codes could bypass browser security tool: Here’s how

Learn how QR codes could bypass browser isolation security, allowing malware communication despite sandboxing. Find out the risks and limits.

Cybersecurity experts have uncovered a surprising new method to bypass an essential browser security feature, even when advanced measures protect the browser. Researchers at Mandiant have demonstrated how QR codes can be exploited to enable malware to communicate with its command-and-control (C2) servers, even when a browser operates in an isolated or sandboxed environment.

What is browser isolation?

Browser isolation is a modern cybersecurity method that safeguards users from web-borne threats. Instead of allowing code and scripts to execute directly on your device, your browser communicates with a remote browser located in a cloud environment or virtual machine. You only receive a visual representation of the web page while all code and commands are processed on the remote system.

This approach effectively creates a barrier between your device and malicious websites, functioning like browsing through the lens of a camera. While this has been a significant step in preventing cyberattacks, the new findings suggest that even this advanced method is not foolproof.

The loophole: How QR codes play a role

Mandiant researchers have discovered a way for C2 servers to interact with malware on an infected device, even when browser isolation is active. The key lies in QR codes. When malware is present on a device, it can analyse the pixels rendered on the screen. If these pixels form a QR code, the malware can decode and use the information to execute further actions.

Mandiant demonstrated this vulnerability using the latest version of Google Chrome to prove the concept. They employed Cobalt Strike’s External C2 feature, a popular penetration testing tool, to showcase how the malware could receive instructions via QR codes.

Limitations of this method

Despite its potential, this technique has significant limitations. QR codes can only transmit a small amount of data—up to 2,189 bytes. Additionally, the process suffers from a latency of about five seconds, making it unsuitable for transmitting large payloads or supporting complex actions like SOCKS proxying.

Further security measures, such as URL scanning or data loss prevention systems, could render this method ineffective. These tools can detect unusual activity or block QR code data streams before damage is done.

While this method may seem impractical for large-scale attacks, it could still be used in targeted, destructive malware campaigns. As a result, IT teams are being urged to remain vigilant. Special attention should be given to monitoring the flow of traffic, especially from headless browsers operating in automation mode, which attackers commonly use to exploit vulnerabilities.

This discovery underscores the evolving nature of cyber threats and highlights the need for continuous advancements in security measures.

Hot this week

Pure Storage reports 16 percent revenue growth in third quarter of fiscal 2026

Pure Storage reports strong third-quarter results with 16 percent revenue growth, higher guidance, and continued product expansion.

Antigravity enters the drone market with the A1, a lightweight FPV model with 360-degree 8K recording

Antigravity launches its first drone, the A1, combining FPV controls with 360-degree 8K imaging in a compact 249g design.

SynaXG secures more than US$20 million in pre-Series A funding to drive global AI-RAN growth

SynaXG raises over US$20 million to expand its AI-RAN technology and accelerate global adoption of next-generation wireless infrastructure.

Porsche unveils new electric-only Cayenne with up to 1,140hp and wireless charging

Porsche launches the new electric-only Cayenne with up to 1,140hp, ultra-fast charging, wireless charging, and improved practicality.

Micron’s exit from Crucial signals a turning point for consumer memory

Micron ends its Crucial consumer line as it shifts focus to AI and enterprise memory, marking a major change in the PC hardware market.

Tiger Brokers: Bringing institutional-grade AI intelligence to global retail investors

AI is redefining retail investing as platforms like Tiger Brokers’ TigerAI integrate verified intelligence, personalisation, and long-term wealth management to empower global investors.

Antigravity enters the drone market with the A1, a lightweight FPV model with 360-degree 8K recording

Antigravity launches its first drone, the A1, combining FPV controls with 360-degree 8K imaging in a compact 249g design.

Micron’s exit from Crucial signals a turning point for consumer memory

Micron ends its Crucial consumer line as it shifts focus to AI and enterprise memory, marking a major change in the PC hardware market.

Sony introduces A7 V with updated sensor, faster processing, and improved stabilisation

Sony launches the A7 V with a new sensor, a faster processor, and upgraded stabilisation, targeting hybrid shooters with enhanced features.

Related Articles

Popular Categories