Why quishing is structurally different from URL phishing
Quishing (QR-code phishing) emerged as a distinct category in late 2022 and grew rapidly through 2023-2025. The category is structurally different from URL-based phishing in two ways that matter for defender economics. First, the payload is an image, which means the standard email-gateway URL-rewriting and reputation-lookup defences do not see the malicious URL until the victim has decoded the QR code with their phone camera. Second, the decode-and-visit step happens on the victim's mobile device, which is frequently outside the corporate network perimeter, without the EDR endpoint agent that would otherwise log or block the visit.
The combined effect is that quishing converts at a materially higher rate than URL phishing against the same target population. Independent measurements from Keepnet and Microsoft Threat Intelligence place quishing click-through at approximately 30 to 45 percent against a 12 to 18 percent baseline for URL phishing. The defender loses visibility at the moment of the scan because the subsequent attacker-controlled page is loaded by the victim's personal browser, frequently on a personal phone, with no corporate-issued certificate or monitoring agent in the path.[Keepnet 2025 + Microsoft Threat Intelligence 2024]