{"id":13120,"date":"2017-08-07T20:00:53","date_gmt":"2017-08-08T01:00:53","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=13120"},"modified":"2017-08-05T21:41:01","modified_gmt":"2017-08-06T02:41:01","slug":"can-qr-code-used-phishing-attack","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/can-qr-code-used-phishing-attack\/","title":{"rendered":"Can a QR Code Be Used in a Phishing Attack"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">QR codes, or Quick Response codes, are an easy method for companies to transmit data to customers. Similar to a bar code, users can scan the QR code to save contact information, visit a URL, or compose a message. These codes are useful for companies and consumers, as they save time and prevent users from manually typing out texts. Unfortunately, relying on QR codes means trusting that the link is safe, an assumption which is sometimes not true. Make sure that the QR code you scan is trustworthy and free of malware by running the Full Virus Scan feature after:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_full \"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-9829 size-full\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg\" alt=\"run-security-scan\" width=\"353\" height=\"79\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/a><\/center><center><\/center><center><\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">Rather than taking a chance with an unknown code, you should rely on this complete virus scan to check for threats on your smartphone\u00a0<\/span><span style=\"font-weight: 400;\">and SD card. Although QR codes cannot be hacked, they\u2019re often plagued by phishing attempts, spelling out trouble for mobile users.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/9-tips-enhance-security-android-phone\/\"><b>9 Tips to Enhance the Security of Your Android Phone<\/b><\/a><\/p>\n<p style=\"text-align: left;\"><b>Phishing Tactics<br \/>\n<\/b><span style=\"font-weight: 400;\">Though more involved than phishing through emails or false site links, QR phishing is still the biggest security breach when it comes to QR codes. These codes are most often displayed in public places, used to direct smartphone users to a company\u2019s website. Hackers will replace these QR code posters or produce their own false posters, both with fake codes which will redirect mobile users to phishing websites. These websites will often appear identical to the real deal; the layout of mobile websites will make it difficult to check the website\u2019s full address.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">In one instance, a malicious QR code in Russia sent a text message to premium numbers, an attack which charged each number $5 per text message. In these and similar instances, most attacks targeted Android devices. In other situations, websites that users were directed to ran browser exploits, a malicious code which takes advantage of vulnerabilities in operating systems. Browser exploits are able to enable microphone and camera access, send emails, and join a botnet in order to carry out a DDoS attack on a website. Due to the nature of browser exploits, Android users will be unable to tell that their device is being attacked.<\/span><\/p>\n<p style=\"text-align: left;\"><b>Protect Yourself<br \/>\n<\/b><span style=\"font-weight: 400;\">To protect yourself, and your phone, from malicious QR codes, make sure to fully examine the poster from which you\u2019re scanning the code. Many times scammers will place the fake QR code above the real one, which can be checked by touching the poster. Be suspicious of the page you land on through the QR code and never share personal or login information. While manually typing in the URL may be more time consuming, this is often the safest way to access a website.<\/span><\/p>\n<p><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>QR codes, or Quick Response codes, are an easy method for companies to transmit data to customers. Similar to a bar code, users can scan the QR code [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[259,182,4457,545,249,67],"class_list":["post-13120","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-malware","tag-phishing-attacks","tag-safety","tag-security","tag-smartphone"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/13120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=13120"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/13120\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=13120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=13120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=13120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}