{"id":561,"date":"2025-09-17T14:54:59","date_gmt":"2025-09-17T13:54:59","guid":{"rendered":"https:\/\/www.mrpaulclarke.co.uk\/?p=561"},"modified":"2025-09-17T14:54:59","modified_gmt":"2025-09-17T13:54:59","slug":"qr-codes-the-hidden-menace","status":"publish","type":"post","link":"https:\/\/www.mrpaulclarke.co.uk\/?p=561","title":{"rendered":"QR Codes &#8211; The hidden menace"},"content":{"rendered":"<p>So QR Codes, those handy little graphics that you scan on your phone. They are wonderful&#8230;. but not always.<\/p>\n<p>Hackers and Criminals are using QR codes to steal money and other information from you. Often disguised as genuine QR codes, but often placed over the genuine QR Codes.<\/p>\n<p><strong>How attackers exploit QR codes<\/strong><br \/>\nWhat can make QR code security threats especially problematic is the element of surprise among unsuspecting users. \u201cI\u2019m not aware of any direct attacks to QR codes, but there have been plenty of examples of attackers utilizing their own QR codes in the course of attacks,\u201d says Chris Sherman, senior industry analyst at Forrester Research.\u201c The main issue is that QR codes can initiate several actions on the user\u2019s device, such as opening a website, adding a contact, or composing an email, but the user often has no idea what will happen when they scan the code,\u201d he says. \u201cNormally you can view the URL before clicking on it, but this isn\u2019t always the case with QR codes.\u201d<\/p>\n<p>A common attack involves placing a malicious QR code in public, sometimes covering up a legitimate QR code, and when unsuspecting users scan the code they are sent to a malicious web page that could host an exploit kit, Sherman says. This can lead to further device compromise or possibly a spoofed login page to steal user credentials.\u201cThis form of phishing is the most common form of QR exploitation,\u201d Sherman says. QR code exploitation that leads to credential theft, device compromise or data theft, and malicious surveillance are the top concerns to both enterprises and consumers, he says.<\/p>\n<p>If QR codes lead to payment sites, then users might divulge their passwords and other personal information that could fall into the wrong hands. \u201cMany websites do drive-by download, so mere presence on the site can start malicious software download,\u201d says Rahul Telang, professor of information systems at Carnegie Mellon University\u2019s Heinz College. \u201cMobile devices in general tend to be less secure than laptops or computers. Since QR codes are used on mobile devices, [the] possibility of vulnerability is higher, too.\u201d Because many of these mobile devices are used within the context of enterprise IT, the infiltration of the devices can become a security weak point for organizations, he says.<\/p>\n<p>Recently the CEO of a British technology company warned the UK government about potential serious flaws in the security of personal information and data used in a new contact tracing app that relies on QR code scanning technology. The technology can be subject to a process called \u201cattagging\u201d or cloning, according to Louis James Davis, CEO of VST Enterprises. With attagging, a genuine QR code is replaced by a cloned QR code that redirects users to a similar website where personal data can be intercepted and breached.<\/p>\n<p>You may see a QR code embedded in a PDF file, supposedly from HR telling you that you need to fill in your personal details. As these codes can not be decoded by anti malware scanners, they are getting through mail filters.<\/p>\n<p>The problem is, once you have scanned it, you wont know you are going to a malicious site until its too late.<\/p>\n<p>So, how do we protect against these attacks? <\/p>\n<p>Don&#8217;t scan the codes unless you have 100% confidence it is ok, have a feel, does it feel raised on the sign you are scanning? Is the E-Mail genuine &#8211; ASK!!!<\/p>\n<p>Protect yourselves at all times.<\/p>\n<div class='embed-container'><iframe loading=\"lazy\" title=\"What Is Quishing? How Hackers Use QR Codes to Steal Your Data\" width=\"1920\" height=\"1080\" src=\"https:\/\/www.youtube.com\/embed\/RVF6NVnJvd8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>So QR Codes, those handy little graphics that you scan on your phone. They are wonderful&#8230;. but not always. Hackers and Criminals are using QR codes to steal money and other information from you. Often disguised as genuine QR codes, but often placed over the genuine QR Codes. How attackers exploit QR codes What can&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/www.mrpaulclarke.co.uk\/?p=561\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39,25],"tags":[],"class_list":["post-561","post","type-post","status-publish","format-standard","hentry","category-advice","category-security"],"_links":{"self":[{"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=561"}],"version-history":[{"count":1,"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/561\/revisions"}],"predecessor-version":[{"id":562,"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/561\/revisions\/562"}],"wp:attachment":[{"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrpaulclarke.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}