“Always think twice before scanning QR codes.”
Using QR codes to fool an individual or a group by presenting something as innocuous or essential when, in reality, the true intent is anything but – is quishing. The objective is to gain access to your information, hack your bank account by stealing credentials, and potentially much more.
QR codes are virtually everywhere these days. They’re seen in restaurants, retail stores, airports, mobile payment systems, supply chains and more – serving as a convenient way to swiftly access information.
And with anything convenient, we all tend to be less guarded. This has created a near-perfect environment for cybercriminals to do their thing – exploit unsuspecting users so they can access their private information or install malware on their device.
QR codes operate by encoding information in a concise, square arrangement of black and white squares. A QR scanner or smartphone camera reads these patterns, interpreting the distinctive configuration of squares and converting it into digital information, ranging from text to website URLs or other data formats. The popularity of QR codes stems from their capacity to store significant data within a compact space and their ease of scanning, rendering them a versatile tool for rapid data retrieval and effortless user interaction.
How Quishing Works Graphic. Source: Google Images.
The widespread use and convenience of QR codes has led to a level of trust in them. After all, how harmful can a simple QR code be? Turns out, it’s quite significant. Cybercriminals exploit the assumption that most consumers perceive QR codes as harmless and mobile phones have become a prime target. First, most people inherently trust QR codes because they’re ubiquitous. Second, most desktop operating systems have phishing protection providing a layer of defense that mobile phones often lack.
Sample QR code phishing attack in email. Source: Google Images.
Do you need to protect your business against quishing attacks? We can help. Call 708-593-3516 or email us info@scsprotect.com.
SOURCES
(1) CBS News
(2) Cyber Security News
(3) ZDNET
(4) AZTech IT
(5) Purdue University
(6) Wikipedia