chat
expand_more

That Word Document Isn’t Broken—It’s a Phishing Attack in Disguise

Attackers exploit Microsoft Word’s file recovery to evade detection, using corrupted docs for QR code phishing. Learn how this tactic bypasses legacy security.
February 13, 2025

A broken document usually seems harmless—just an inconvenience to fix. But in this series of phishing attacks, a corrupted Word file isn’t a mistake; it’s a deliberate trap.

A phishing campaign observed by Abnormal exploits Microsoft Word’s built-in file recovery feature to make malicious documents seem harmless, turning what looks like a broken file into an open door for attackers.

By sending intentionally corrupted Word documents, attackers successfully bypass security tools, trick users into opening the files, and ultimately steal credentials via embedded QR codes.

Here’s how it works, what makes it unique, and why legacy security tools struggle to stop it.

Breaking Down the Corrupted Document QR Code Phishing Attack

At its core, this attack relies on a combination of social engineering and technical evasion tactics. It begins with the target receiving an email that appears to come from the HR or payroll department, often with subject lines referencing employee benefits, bonuses, or payment processing.

Corrupted Word Doc QR Code Phishing Email Header

Attached to the email is a Word document with a seemingly legitimate filename, such as Q4_Benefits_&_Bonus.docx.

Corrupted Word Doc QR Code Phishing Attachment

However, the document is intentionally malformed in a way that triggers Word's built-in file recovery feature. Thus, when the recipient attempts to open the file, Microsoft Word detects the corruption and prompts the user with a recovery option. This can lead users to trust the document while unknowingly interacting with malicious content embedded within the recovered version.

Corrupted Word Doc QR Code Phishing File Recovery

If the target clicks "Yes", Word repairs the file and reveals a document customized with the company’s branding and an embedded QR code.

Corrupted Word Doc QR Code Phishing QR Code

The QR code is the final step in the phishing chain. Scanning it directs the user to a phishing website disguised as a Microsoft 365 login page.

Corrupted Word Doc QR Code Phishing Microsoft Login

Because these sites are designed to mimic the login portals of targeted companies, the recipient is more likely to enter their credentials, unknowingly granting the attacker unauthorized access to their account.

This attack is particularly dangerous because it effectively shifts the phishing payload off-screen. By embedding the phishing link within a QR code rather than a clickable link, attackers sidestep traditional URL scanning mechanisms and increase the likelihood of success.

What Makes This Attack Unique?

While phishing campaigns leveraging QR codes are not new, this particular technique introduces several novel elements.

Many email security tools struggle to analyze corrupted files. If a document fails structural integrity checks, some security tools may be unable to fully analyze its contents, potentially allowing phishing emails to evade detection. By manipulating the file structure in a particular way, attackers effectively turn a perceived flaw into an advantage.

Another factor that makes this attack so effective is the level of personalization. The attack is not just about delivering phishing lures—it’s about making them believable. The phishing documents are not generic but tailored with the target company’s logo and branding, making them appear more legitimate. This increases the likelihood that employees will trust the document and proceed with the recovery process.

Additionally, the attack strategically moves phishing activity beyond the corporate environment. Since QR codes must be scanned with a mobile device, users are likely to engage with them using their personal devices, which may not be protected by corporate security policies. This further reduces the likelihood of detection.

Why Corrupted Document QR Code Phishing Attacks Are Difficult to Detect

Legacy email security tools face several challenges in preventing this attack. Some traditional email security solutions may attempt to repair broken files before determining if they’re malicious. However, if the corruption affects critical structure elements, the system may be unable to parse the document fully, leading to potential evasion. Moreover, unless the document contains recognizable malicious macros, links, or scripts, detection may still fail.

Signature-based detection, which many SEGs rely on, is also ineffective. Because these documents contain no traditional malware signatures and do not exhibit behaviors typically associated with phishing emails, they often go undetected. Instead, they are seemingly benign files that become dangerous only after user interaction.

Additionally, most email security solutions rely on URL scanning to identify phishing attempts. However, because this attack hides the phishing payload inside a QR code rather than a clickable link, traditional security tools fail to flag it.

Even when SEGs detect these emails post-delivery, remediation is often delayed. In some cases, threat intelligence teams have observed that remediation efforts took several hours, providing attackers with ample time to steal credentials before the emails were removed from inboxes.

Stopping Corrupted Document QR Code Phishing Attacks with Behavioral AI

The use of corrupted Word documents to evade detection represents a significant shift in phishing tactics. By manipulating Microsoft Word’s recovery feature, attackers bypass traditional scanning tools and lure users into scanning malicious QR codes. This technique highlights the limitations of legacy security solutions and underscores the increasing need for AI-driven detection that prioritizes behavioral analysis over static threat signatures.

Unlike legacy tools, AI-powered email security solutions can detect these attacks more effectively by analyzing behavioral patterns. AI models identify unusual sender behaviors, unexpected email content, and irregular attachment structures that deviate from normal communication trends. Instead of relying on known threat signatures, AI assesses the context of an email, recognizing anomalies even when no direct malicious indicators are present.

As attackers continue to innovate, security defenses must evolve to match their sophistication. When attackers start corrupting security itself, only advanced AI-powered detection can ensure organizations remain protected.

For even more insights into the threat landscape and predictions for where it’s headed, download our report, Inbox Under Siege: 5 Email Attacks You Need to Know for 2025.

Download the Report
That Word Document Isn’t Broken—It’s a Phishing Attack in Disguise

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Open Redirects
Explore the risks of open redirects and how they enable attackers to circumvent email security.
Read More
B Corrupted Word Doc QR Code Phishing Attack
Attackers exploit Microsoft Word’s file recovery to evade detection, using corrupted docs for QR code phishing. Learn how this tactic bypasses legacy security.
Read More
B H1 2025 Email Threat Report Blog
Explore new research on how AI is amplifying the impact of BEC and VEC attacks and learn how to defend against these evolving email security threats.
Read More
B Exploiting Google Services Blog
Cybercriminals misuse Google services for phishing, ad hijacking, and more. Learn five attack methods and how to protect your accounts.
Read More
B AI vs AI
Uncover the dangers of AI-driven scams. Our ethical hacker demonstrates real-time social engineering attacks, highlighting essential cybersecurity strategies for 2025.
Read More
B Misclassification Adaptation Blog
Learn how Abnormal Security minimizes false positives and false negatives with a multi-layered approach to cyberattack detection and email security.
Read More