3 min read

Fake missile alerts used in phishing campaign amid Iran-US tensions

Fake missile alerts used in phishing campaign amid Iran-US tensions

Attackers are exploiting fear around the ongoing geopolitical conflict to trick recipients into scanning malicious QR codes that lead to fake Microsoft login pages.

 

What happened

Security researchers have uncovered a phishing campaign in which attackers impersonate the Ministry of Interior and Civil Defense to send fake emergency alerts warning of missile attacks. According to Hackread, the emails carry the subject line "Public Safety Advisory – Action Recommended" and display a SEVERE / ACTIVE warning instructing recipients to seek cover immediately. Rather than a clickable link, each email contains a QR code described as providing access to official emergency procedures. The QR code is used deliberately to avoid security filters, which scan text-based links but do not process embedded images. When scanned, the code redirects victims to a fake verification checkpoint at a non-government domain, then on to a fake Microsoft login page designed to capture credentials. The sending address used in observed samples, ministryofinterior-civildefensenetwork@qualitycollection.com.au, has no connection to any government authority.

 

Going deeper

The campaign layers several social engineering techniques to reduce the time recipients spend assessing the message before acting. The subject line invokes official authority. The warning language mirrors real civil defense alerts seen during regional tensions, creating a contextual plausibility that generic phishing emails lack. A fabricated sense of physical danger is used to prompt immediate action before the recipient considers whether the communication is legitimate. The QR code serves a dual purpose: it bypasses email security tools that scan for malicious URLs in message text, and it moves the credential harvesting step to the victim's mobile device, which typically sits outside the organization's email security perimeter. Once on the fake Microsoft page, any credentials entered are captured directly by the attacker.

 

What was said

Researchers described the campaign as "a classic example of social engineering, leveraging panic and authority to trick users into acting quickly without verification." They noted that "the repeated phrasing, lack of personalization, and reliance on a QR code instead of a verified source all indicate a mass phishing attempt designed to exploit situations of panic and prompt impulsive actions." Researchers also stated the attackers are "exploiting fear-driven narratives" to catch recipients while they are distracted by the news.

 

In the know

The campaign sits within a documented pattern of Iran-aligned cyber operations targeting Microsoft 365 environments. According to The Hacker News, an Iran-nexus threat actor conducted three waves of password spraying attacks in March 2026, targeting more than 300 organizations in Israel and 25 in the UAE across government, technology, transportation, and energy sectors. Activity from the same actor was also observed against targets in Europe, the United States, and the United Kingdom. The use of civil emergency branding in phishing lures mirrors a broader pattern in which conflict-adjacent fear is weaponized to lower recipients' resistance to acting on unsolicited communications.

 

The big picture

Phishing campaigns that exploit geopolitical events are particularly effective against healthcare organizations because staff already receive urgent, authority-bearing communications as a routine part of their work. A message invoking a civil emergency and government authority carries the same surface characteristics as legitimate high-priority notifications that healthcare workers are trained to act on quickly. According to Paubox's Top 3 Healthcare Email Attacks report, impersonation attacks succeed because email treats identity as trustworthy by default, and only 5 percent of known phishing attacks are reported by employees to security teams, meaning most of these campaigns proceed without internal detection. Microsoft's Digital Defense Report, cited in the same research, confirms that "attackers increasingly exploit trust in familiar identities, such as executives and vendors, rather than relying on malicious attachments or links."

 

FAQs

Why do attackers use QR codes instead of links in phishing emails?

Email security tools scan message content for malicious URLs, but QR codes are images and contain no scannable text. The malicious destination is only revealed when a human scans the code with a mobile device, which bypasses the organization's email gateway entirely.

 

How does geopolitical tension make phishing more effective?

Conflict-themed lures create a sense of physical urgency that overrides the caution recipients might otherwise apply to unexpected emails. When people believe their safety is at risk, they are more likely to act immediately without verifying the source, which is precisely what attackers depend on.

 

What signals indicate this is a mass phishing campaign rather than a targeted attack?

Researchers noted the repeated phrasing, lack of personalization, and use of a generic QR code rather than verified government resources as indicators of a mass campaign. The sending domain is a commercial Australian address unrelated to any government entity, and the fake Microsoft login page is a standard credential harvesting tool used across many campaigns.

 

How can organizations protect against QR code phishing?

Staff should be trained to treat any QR code in an unsolicited email with the same skepticism applied to unexpected links, regardless of the apparent sender authority. Organizations can also implement mobile device management policies that restrict which sites managed devices can access after scanning codes, and deploy email security tools with image analysis capabilities.

 

Why do attackers target Microsoft credentials specifically?

Microsoft 365 is used by approximately 79 percent of healthcare organizations and provides access to email, files, Teams, and connected applications through a single set of credentials. Compromising one Microsoft account gives an attacker access to a wide range of sensitive data and the ability to launch further attacks from within the organization's own trusted infrastructure.

Subscribe to Paubox Weekly

Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.