QRishing: What it is and how to avoid this scam

  • QRishing is a phishing technique that uses QR codes to redirect victims to fraudulent websites.
  • Criminals can distribute malicious QR codes via posters, emails or flyers.
  • It is crucial to verify the URL before accessing and never download files from untrusted sources.

QRishing

QRishing is a cyber threat which has gained ground in recent years, especially after the pandemic, when the use of QR codes became massively popular. These codes, so useful in restaurants, events or to access information, have become a perfect opportunity for cybercriminals. ButWhat exactly is QRishing and how can we protect ourselves from it? In this article, we explain in detail what it consists of and what measures you can take to avoid falling into this trap.

What is QRishing

What is QRishing and how to avoid it

QRishing is a technique that combines the use of QR codes and the Phishing, that is, tricking the user into providing sensitive information or entering credentials on a fraudulent website. QR codes redirect the victim to a fake URL, which may simulate that of an online store, a bank or any other legitimate service, with the aim of stealing personal or banking data or performing unwanted actions, such as subscribing to premium services.

This type of attack has become more common thanks to the expansion of QR codes during the pandemic, when their use became common in bars, restaurants, events and shops. Many people do not usually verify the URL to which the code directs them, which is exploited by attackers to deceive us.

Scanning a simple QR code may seem harmless, but the ease of access it represents has its counterpart in the dangers to which we are exposed if we do not take the necessary precautions. Criminals take advantage of the trust we have in these codes to redirect us to fraudulent websites or even download malware onto our devices. That is why it is vital to be informed and know how to detect these digital frauds.

How QRishing works

How to avoid QRishing

The QRishing process begins when The attacker generates a malicious QR code that, when scanned, redirects the victim to a web page configured to steal credentials, installing malware or collecting personal information. Criminals have different ways of distributing these QR codes, and you might be surprised at how easy it can be.

Some of the most common ways to distribute these codes include:

  • Signs in public places: They use stickers with fake QR codes instead of real ones in restaurants or urban advertising.
  • Emails or direct messages: In this case, the attacker sends a message that appears legitimate from a company or institution, but includes a QR code that redirects to their trap.
  • Pamphlets or flyers: In some cases, criminals distribute fake flyers containing QR codes to redirect to fraudulent websites.

The most obvious danger is that users, after scanning the QR code, are taken to a site that appears legitimate, but is actually a scam. Enter personal data or make purchases on these pages will result in loss of money or identity theft.

Tips to avoid QRishing

Tips to avoid QRishing

Although it seems difficult to avoid falling into an attack of this type, there are Several precautions you can take to reduce the risks of falling victim to QRishingHere are some essential tips:

  • Always check the URL to which the QR code directs you: When scanning a code, it is important to check the web address before accessing it. If it doesn't seem to match what you expect or if the URL is suspicious, it is best not to open it.
  • Do not accept automatic downloads: If a QR code causes a file to download to your device, unless you are completely sure that it is legitimate, do not accept the download.
  • Use scanning applications that allow you to view the URL before accessing it: Some QR code scanning apps offer you the ability to preview the link before opening it, giving you an extra layer of security.
  • Do not enter personal or financial data on websites to which QR codes direct you: If a site asks you for sensitive information, make sure it is legitimate. If in doubt, access the page manually.

Also, be wary of QR codes in uncontrolled places such as stickers or flyers on the street. It is not recommended to scan them if you are not sure about the origin of the code..

Dynamic and static QR codes

There are two main categories of QR codes: static and dynamic. Static QR codes do not allow you to modify the URL, making them safer options. On the other hand, you can edit dynamic ones, which allows cybercriminals to modify the content they redirect to.

The Dynamic QR are more attractive to QRishing attacks, since, being modifiable, They allow the original URL to be changed to a fraudulent website without the user noticing..

What to do if you are a victim of a QRishing attack

What to do if you are a victim of a QRishing attack

Despite all the precautions you can take, it is possible to fall victim to a QRishing attack. If you suspect you have been scammed, it is important to act quickly:

  • Remove any malware that may have affected your device, if you have downloaded any suspicious files.
  • Change your passwords immediately, especially in accounts where you have entered credentials or in financial services.
  • Contact your bank If you provided banking information or made payments on a fraudulent website, they will tell you the steps to follow to block your account and prevent further damage.
  • Format the device if necessary to ensure that all traces of malware are completely gone.

Criminals use your information for the long term, so you should monitor your accounts regularly if you have been the victim of an attack.

Avoiding QRishing is possible if you adopt an attitude of Be careful with any QR code you encounter in your daily lifeAs we have seen, many times a simple scan can open the door to multiple risks, so staying informed and following the recommendations above is the best way to protect your data and financial information.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Actualidad Blog
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.