Cybersecurity Today Podcast Summary
Episode: Industrial Phishing Kit QRR Discovered: New Cyber Threats Unveiled
Host: David Shipley (substituting for Jim Love)
Date: November 12, 2025
Episode Overview
In this episode, David Shipley uncovers the latest and most sophisticated phishing threats facing organizations, focusing on the new "Quantum Root Redirect" (QRR) phishing kit. The discussion explores the industrialization of phishing, evolving social engineering tactics, AI vulnerabilities, and a major data breach at the University of Pennsylvania. Solutions and critical takeaways for defending against rising cyberthreats are offered throughout.
Key Discussion Points & Insights
1. Quantum Root Redirect (QRR): The New Age of Industrial Phishing
[00:19 – 04:17]
- What is QRR?
- A fully automated phishing-as-a-service platform leveraging a global network of compromised domains.
- Steals Microsoft 365 credentials by automating all attack steps (email delivery, user filtering, routing, credential theft, and campaign analytics).
- Operational Sophistication
- Uses various lures: DocuSign requests, payment alerts, missed voicemail notifications, QR codes.
- Reroutes clicks through compromised domains to evade detection—security scanners get sent to benign sites, real users reach phishing pages.
- Scale & Reach
- Active in over 90 countries since August; U.S. users make up ~75% of targets.
- Performs real-time analytics on the attack's success.
- QRR as Part of a Larger Ecosystem
- Similar services: Void Proxy, Darkoola, Morphing, Meerkat, Tycoon 2fa.
- Accelerates and democratizes cybercrime.
"It's a phishing factory in a box."
— David Shipley [01:20]
- Defensive Imperatives
- Shift from just email filtering to layered security: monitoring, awareness, and security culture.
2. Large-scale Click Fix Phishing in the Hospitality Industry
[04:17 – 08:41]
- How the Campaign Works
- Begins with compromised email accounts sending real-looking booking messages to other hotels.
- Employs “Click Fix” social engineering—victims are prompted to paste PowerShell commands that install “Pure RAT” malware.
- Fake recaptcha windows and dynamic instructions (adapt for Windows/Mac) make the attacks highly convincing.
- Pure RAT provides attackers with full access: keylogging, webcam/microphone control, data exfiltration, and lateral movement.
- Double Victimization
- Attackers use stolen credentials to access booking platforms (e.g., booking.com, Expedia) and scam guests directly.
- Victims receive personalized phishing messages, leveraging real reservation details.
- Growing Criminal Marketplace
- Booking.com admin accounts are sold on Telegram and cybercrime forums (as low as $40).
- “ModeratorBooking” offers a credential-checking service for would-be attackers.
"Every step of this attack chain, from credential theft to malware delivery to resale and monetization, now operates as a service."
— David Shipley [07:09]
- Professionalization and Automation
- Attackers provide video instructions, countdown timers, fake verifications, and OS-specific payloads.
- Lowers the bar for entry—less skilled criminals can run sophisticated campaigns.
"No industry is immune from the professionalization of phishing. And when social engineering meets this kind of automation, even trained users can be tricked ..."
— David Shipley [08:26]
- Defensive Guidance
- Encourage immediate, shame-free reporting of compromises.
- Culture and resilience remain central, especially where brand trust is vital.
3. AI and Prompt Injection Attacks: ChatGPT Vulnerabilities
[08:41 – 11:36]
- Breakdown of Security Flaws
- Researchers at Tenable detail seven new prompt injection techniques targeting ChatGPT (notably GPT5), exploiting the SearchGPT feature.
- Malicious commands hidden in website code are extracted by SearchGPT and inserted into ongoing AI chats.
- Data exfiltration achieved via crafted markdown image links—stolen content leaves the chat engine letter by letter.
- Bypassing Safeguards & Persistence
- Bing tracking URLs bypass OpenAI’s filters (trusted domain).
- With ChatGPT’s long-term memory, malicious prompts can persist across sessions.
- Industry Response & Warnings
- OpenAI has patched some issues, but several vulnerabilities remain.
"AI does not understand intent. It just follows instructions, and in the wrong context, that obedience can and will be weaponized."
— David Shipley [11:18]
- Broader Implication
- Rushed AI deployments often forgo security review.
- Users must critically evaluate AI output and manage access permissions.
4. University of Pennsylvania (UPENN) Data Breach: Culture and Leadership in Security
[11:36 – 14:20]
- Incident Overview
- Hackers phished UPENN employees, sending imposter emails from official university accounts to alumni/staff.
- Initially dismissed as spam, later confirmed as legitimate after attackers accessed donor and alumni records.
- Over 1.2 million individuals’ data allegedly stolen; first class-action filed.
- Critical Vulnerability: MFA Exceptions
- Anonymous source reveals MFA (multi-factor authentication) exemptions for senior leadership.
- Unknown if this was exploited, but the mere presence of “VIP exceptions” undermines organizational risk posture.
"When leadership exempts itself from security controls, it doesn't just create a huge target on them and a risk for the organization, it creates a culture of double standards."
— David Shipley [13:02]
- Cyber Insurance Implications
- Reference: City of Hamilton, Ontario—insurance claim denied due to incomplete MFA, resulting in uncovered losses.
- MFA exceptions can lead to denied cyber insurance coverage.
"Cybersecurity is not just a technical issue, it is a leadership issue. The standards leaders set for themselves define the standards everyone else will follow ..."
— David Shipley [13:56]
- Takeaway
- Security culture is modeled from the top; organizations where leaders practice what they preach see lower risk and better outcomes.
Notable Quotes & Memorable Moments
-
QRR’s significance:
"Phishing isn’t just getting more creative, it’s getting even more automated. The days of handcrafted scams dominating phishing are clearly over ..."
— David Shipley [03:49] -
On industrialized cybercrime:
"The industrialization of cybercrime continues apace. Every step... now operates as a service. And that means smaller, less skilled threat actors can participate ..."
— David Shipley [07:09] -
AI’s security pitfalls:
"These companies are so eager to rush new technologies out, they aren’t thinking through security. Clearly, you have to."
— David Shipley [11:53] -
Leadership’s role in security:
"Organizations where people think their senior leaders care ... have lower phishing click rates, i.e., they’re less risky."
— David Shipley [14:15]
Recommended Listening Segments
- Introduction to QRR and Phishing Platform Industrialization — [00:19 – 04:17]
- Hospitality Industry Click Fix Phishing Campaign — [04:17 – 08:41]
- ChatGPT AI Prompt Injection Exploits — [08:41 – 11:36]
- UPENN Data Breach & Leadership Lessons — [11:36 – 14:20]
Conclusion & Core Takeaways
- Automation and industrialization are redefining phishing attacks, making them faster, more scalable, and harder to detect—even for skilled IT teams.
- Social engineering attacks are increasingly packaged as “plug-and-play” services, making sophisticated attacks accessible to low-skilled criminals.
- AI tools like ChatGPT are vulnerable to new classes of attacks; organizations must balance innovation with robust security review and user education.
- Cybersecurity culture starts at the top; leadership behaviors and exceptions matter not just for risk, but for cyber insurance eligibility and team morale.
- Immediate and open reporting is crucial; overcoming victim blame can reduce dwell time and overall impact.
"Make sure your organization is one of those where people believe senior leadership care and do act in a secure way."
— David Shipley [14:15]
