by Scott Sykes, CISO
While QR codes offer convenience, they also present new avenues for cybercriminals. Malicious actors exploit these codes through various tactics:
- Overlaying QR Codes: Replacing legitimate QR codes with malicious ones in public spaces, redirecting users to phishing sites or fraudulent payment systems.
- In a recent case in California, criminals stuck a fake QR code over the meters real QR code. Users scanned it, went to the fraudulent site, and entered their payment information, thinking they were paying for parking.
- Phishing Emails: Embedding malicious QR codes in phishing emails to bypass traditional URL-based security measures.
- Premium Service Subscriptions: Enticing users to scan QR codes that subscribe them to unwanted premium services.
- Cryptocurrency Scams: Utilizing QR codes to download counterfeit wallets, steal cryptocurrency funds, or authorize unauthorized transactions.
- Malware Delivery: Employing QR codes to distribute malicious applications that steal data or compromise devices.
Mitigating QR Code Scams:
- Scrutinize QR Code Sources: Avoid scanning codes from unsolicited emails, text messages, or unknown sources.
- Verify the Destination URL: If possible, check the destination URL before interacting with the QR code.
- When scanning a QR code, your smartphone's camera will instantly present a confirmation prompt displaying the intended URL. Prior to accessing the linked website, it is imperative to thoroughly examine the URL for any signs of malicious activity. Verify the website's SSL certificate for added security assurance.
- Utilize Reputable QR Code Scanners: Employ built-in camera apps or dedicated security-focused scanners for enhanced protection.
- Maintain Strong Device Security: Ensure your device has up-to-date security software, a robust password, and a reliable antivirus solution.
- Be Wary of Unexpected Requests: Be cautious of granting excessive permissions to applications, especially those related to accessibility.
Before scanning a QR code, exercise caution. Scrutinize the physical location and appearance of the code itself. Always carefully examine the displayed URL before proceeding. Decisively decline any requests for payment or personal information.