Quishing, or how to protect yourself from phishing through QR codes

15 October 2024 9 minutes Author: Cyber Witcher
Quishing is a new form of phishing that uses QR codes to redirect users to malicious websites. Fraudsters integrate dangerous links into QR codes to steal personal information or infect devices with malware. This type of attack is becoming increasingly popular due to the growing use of QR codes in everyday life.

What is quishing?

QR phishing, also known as “quishing,” is a type of cybercrime that uses the popularity of QR codes to trick users. In this scam, cybercriminals create malicious QR codes that, when scanned, redirect users to fraudulent websites or automatically download malware. As QR codes are increasingly used for various purposes, including accessing menus or making payments, users may accidentally scan malicious codes, putting their personal information at risk.

This danger became particularly prominent during the 2022 Super Bowl, when Coinbase’s QR code ad generated massive interest, which in turn drew the attention of the cybersecurity community. Against this backdrop, there have been cases of Crypto QR code scams, where fraudsters used fake codes to trick victims into withdrawing funds from their accounts.

The term “quishing” is a combination of the words QR codes and phishing. It describes a method by which cybercriminals create fake QR codes to redirect people to malicious sites, steal personal data, or install malware on their devices. The main goal of such attacks is to trick users into thinking they are scanning a harmless or useful QR code, when in fact the code is intended to gain access to their personal or financial information.

What is a QR code?

QR codes, or quick response codes, are two-dimensional barcodes that can store large amounts of information and can be quickly read by smartphones or scanners. They were created in 1994 by a Japanese car manufacturer to streamline production, but became especially popular during the pandemic to help support business during social distancing. Their use has increased in various fields such as payment processing, marketing and advertising. Research shows that by 2025, more than 100 million users in the US will be scanning QR codes from their phones.

QR codes can be scanned from both screens and printed materials, making them a versatile tool in many areas. They are widely used in public places, such as billboards and restaurants, as well as in digital messages such as SMS, social media and email.

Static and dynamic QR codes

QR codes can be divided into two main types based on their data flexibility: static and dynamic.

  • Static QR codes are fixed and cannot be changed once created. They are typically used to share static information, such as a website URL, contact details, or a Wi-Fi password.

  • Dynamic QR codes, on the other hand, are more flexible because the information they encode can be updated or changed without changing the appearance of the code. They contain a unique URL that directs users to the server where the information is stored. This adaptability makes them ideal for situations where content needs frequent updates, such as event information, promotions or real-time inventory tracking. However, this same flexibility also poses a security risk, as fraudsters can use dynamic QR codes by changing their source to redirect users to malicious sites.

What is phishing?

Phishing is a popular method among cybercriminals to gain access to sensitive data through social engineering, usually through emails. Such emails often contain links or attachments that trick users into handing over personal information. Modern variants of phishing include vishing (phishing via phone calls), smishing (phishing via SMS) and quishing (phishing via QR codes), where each method uses different communication channels to achieve the same fraudulent goals, including identity theft via QR codes .

How does quishing work?

Quishing is a type of phishing attack that uses QR codes to trick people into visiting malicious sites or downloading malicious software. QR codes can contain links to various resources such as documents, payment portals and other sources. Cybercriminals manipulate codes by embedding malicious links, virus-infected files or fake payment pages. Since the content of the QR code is not visible to the user, it allows attackers to bypass security checks by inserting malicious codes into emails or promotional materials.

A typical quishing attack starts with fraudsters creating QR codes that redirect to fake login pages or sites that automatically download malware after being scanned. These malicious codes can be placed in emails as images or attachments, or placed in public places where they are likely to be scanned by users. Once scanned, victims may be tricked into entering their credentials or banking information, or automatically download malicious files. In some cases, the download of malicious content occurs automatically immediately after the scan, which further complicates the protection of the victim’s device.

This type of fraud exploits people’s natural trust in QR codes and their convenience, as users cannot see the content behind the QR code until they scan it. This makes quishing an effective tool for stealing personal information and spreading malware.

Understanding QRLJacking: A quishing example

QRLJacking is a sophisticated form of quishing that specifically targets Quick Response Login (QRL) systems. QRL is a convenient authentication method that allows users to log into websites or digital services by scanning a QR code with their smartphone. This simplifies the login process by eliminating the need to remember complex passwords, giving users an alternative.

However, this convenience also carries potential risks that cybercriminals exploit. A QRLJacking attack begins with hackers initiating a session of a targeted website or application and cloning a legitimate QR code. They then manipulate this code by redirecting it to their own server and inserting it into a fake login page that looks like the real thing. A malicious QR code is usually sent via email or other channels, forcing users to scan it to log in.

The danger of QRLJacking is that without multi-factor authentication, attackers can instantly gain access to a victim’s accounts after scanning a fake QR code. An example of this attack is the ING Bank case where their app allowed customers to log in to other devices via a QR code. Cybercriminals have taken advantage of this by creating fake QR codes for the app. Unsuspecting users became victims, resulting in large sums of money disappearing from their accounts.

How can you detect a quishing attack?

Detecting a quishing attack can be quite difficult due to the fact that QR codes hide their content until they are scanned. Unlike conventional phishing attacks, phishing emails can contain QR codes as plain images or attachments with secure extensions, allowing them to easily bypass email security filters and malware detection systems. Because of this, such emails often do not end up in the spam folder, leaving users vulnerable to fraudulent social engineering schemes.

One of the reasons QR codes have become attractive to fraudsters is that they pique users’ curiosity and tap into emotions like fear and urgency. Fraudsters develop such codes to encourage people to act quickly and scan them without thinking about the possible risks. For example, a malicious QR code can be created to fake a bill or fine payment, prompting the victim to take quick action without further verification.

This combination of convenience and emotional pressure makes QR codes an effective tool for conducting fraudulent transactions. Fraudsters use the reliability and simplicity of this tool to create an illusion of security that makes users unaware that they are victims of malicious activity.

To protect yourself from QR code fraud, it’s important to be vigilant and look for certain signs before scanning a QR code:

  • Unexpected or unwanted QR codes: Be wary of QR codes that appear in unsolicited emails or messages, especially if they urge you to take immediate action.

  • Lack of context or explanation: Legitimate QR codes usually come with clear explanations of what they are for. Be careful with codes without context or a reliable source.

  • Suspicious sender.Check the sender’s email address or contact information for any signs of illegitimacy, such as misspellings or unusual domain names.

  • Urgency or Pressure: Fraudsters often create a sense of urgency to prompt quick action. Be skeptical of messages that force you to immediately scan a QR code.

  • Verify the source: If possible, verify the legitimacy of the QR code by contacting the alleged sender through official channels.

  • Use a secure QR code scanner: Some QR code scanning apps offer security features that check the link’s safety before opening it. Consider using an app like this to add an extra layer of protection.

By being aware of these signs and exercising caution, you can reduce the risk of becoming a victim of a quishing attack and protect your sensitive information from being hacked.

Here’s how you can protect yourself from quishing

To protect against quishing attacks, it’s important to combine general anti-phishing strategies with measures specifically tailored to the unique challenges associated with QR codes:

  • Check the source of the QR code: Be careful when scanning QR codes, especially from unknown sources or those that promise too good to be true offers. If the code comes from a seemingly official source, a friend or colleague, verify its authenticity directly with them or visit their official website.

  • Use a reliable QR code reader: While most smartphones have built-in QR code scanning capabilities, if you choose a third-party app, make sure it’s reliable. Be wary of fraudulent QR scanner updates, as they have been known to distribute malware in the past.

  • Preview the destination URL: If your scanner allows it, preview the link the QR code takes you to before accessing it. This precaution helps protect against QR codes that automatically download malware when scanned.

  • Be careful with personal information: After scanning the QR code, be alert when you are asked to enter personal information on the linked page. Carefully check the logo and the full URL of the site and, if possible, manually enter the original URL into your browser instead of using the link provided by the QR code.

  • Enable two-factor authentication: Adding this extra layer of security can prevent unauthorized access to your accounts, even if a cybercriminal obtains your credentials. Be careful when accepting authentication notifications on your phone unless you initiated the account access attempt.

By following these guidelines, you can strengthen your defenses against quishing attacks and protect your sensitive information from falling into the wrong hands.

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.