Quishing (QR Code Phishing): A Complete Protection Guide
Quishing, or QR code phishing, is a rapidly growing cyberattack method where criminals replace legitimate QR codes with malicious ones or create fake codes that redirect victims to fraudulent websites. According to the FBI's Internet Crime Complaint Center, QR code-related scams increased by 587% between 2022 and 2023, with average losses reaching $1,500 per incident. These attacks exploit the fact that QR codes are unreadable to humans, making it impossible to verify a destination before scanning. The scam typically works by placing fraudulent QR codes on parking meters, restaurant tables, product packaging, or in email attachments that appear to be from legitimate companies. When scanned, these codes redirect victims to convincing fake websites designed to harvest login credentials, banking information, or payment card details. In corporate environments, attackers send QR codes via email that bypass traditional security filters, leading employees to fake Microsoft 365 login pages or payroll portals. What makes quishing particularly dangerous is its ability to circumvent conventional security measures. Traditional email security systems scan URLs and attachments for malicious content, but QR codes appear as harmless images. Additionally, many smartphones automatically open links from QR codes without showing the full URL first, giving victims no opportunity to verify the destination. The Federal Trade Commission reported that businesses lost over $48 million to QR code scams in 2023, with both consumers and employees falling victim to these sophisticated attacks.
Common Tactics
- • Physical QR code replacement: Scammers print stickers with malicious QR codes and place them over legitimate codes on parking meters, restaurant payment terminals, EV charging stations, and delivery package labels, redirecting payments to their own accounts.
- • Email-based quishing campaigns: Attackers send professional-looking emails claiming to be from IT departments, HR, or financial institutions with QR codes for urgent password resets, multi-factor authentication setup, or invoice payments that lead to credential harvesting sites.
- • Fake parking violation notices: Criminals place fraudulent parking tickets on windshields with QR codes claiming to offer quick payment options, which actually steal credit card information and personal details when scanned.
- • Cryptocurrency investment lures: Scammers distribute QR codes through social media and messaging apps claiming to provide access to exclusive crypto investment opportunities, but actually drain victims' digital wallets when scanned.
- • Package delivery scams: Fraudsters send text messages or emails with QR codes claiming to reschedule package deliveries or pay customs fees, leading to fake postal service sites that capture payment card information.
- • Restaurant menu and payment scams: Attackers create fake QR codes for digital menus or table service payments in restaurants, redirecting diners to lookalike sites that steal credit card details when customers attempt to pay their bills.
How to Identify
- URL preview mismatch: Before opening the link, check if your phone displays a preview URL that doesn't match the expected destination (e.g., a parking meter QR showing a personal website URL instead of the city's official domain).
- Physical tampering evidence: Look for stickers placed over original QR codes, misaligned printing, different paper quality, or codes that appear to be added after the fact rather than professionally printed as part of the original material.
- Urgent action requests: Be suspicious of QR codes accompanied by threatening language like 'account will be suspended in 24 hours,' 'urgent security update required,' or 'pay within 2 hours to avoid penalties,' as legitimate services rarely use such pressure tactics.
- Generic or impersonal communication: Emails or messages containing QR codes that don't use your actual name, reference vague account issues, or lack specific details about your relationship with the supposed sender are likely fraudulent.
- Unexpected authentication requests: If you receive unsolicited QR codes claiming to set up multi-factor authentication, verify account details, or confirm identity when you didn't initiate any such process, this is a major red flag.
- Payment destination inconsistency: When a QR code leads to a payment page, verify the recipient name, business details, and payment processor match expectations—scammers often use personal accounts or unfamiliar payment platforms instead of established merchant services.
How to Protect Yourself
- Install a QR scanner with URL preview: Use QR code reader apps that display the full destination URL before opening it, and always verify the domain matches the legitimate organization (check for subtle misspellings like 'micros0ft.com' with a zero instead of an 'o').
- Manually type official URLs: Instead of scanning QR codes for sensitive actions like banking, password resets, or payments, navigate to the official website by typing the URL directly into your browser or using saved bookmarks.
- Verify physical QR codes before scanning: Examine parking meters, payment terminals, and product packaging for signs of tampering—legitimate QR codes should be printed as part of the original material, not added via stickers or separate labels.
- Enable two-factor authentication on all accounts: Even if scammers obtain your credentials through quishing, proper 2FA using authenticator apps (not SMS) prevents them from accessing your accounts without the secondary verification code.
- Contact organizations through official channels: If you receive a QR code claiming urgent action is needed, independently contact the organization using phone numbers or websites from their official sources, not information provided in the suspicious message.
- Use mobile security software: Install reputable mobile security apps that can detect and block malicious websites, even when accessed through QR codes, providing an additional layer of protection against credential theft and malware.
Real-World Examples
A small business owner received an email appearing to be from their accounting software provider with a QR code for 'mandatory security verification.' Scanning it led to a convincing fake login page where they entered their credentials. Within 2 hours, scammers accessed their account, changed recovery information, and submitted fraudulent ACH transfers totaling $8,400 to external accounts. The business only discovered the breach when legitimate payment requests bounced due to insufficient funds.
Restaurant patrons at a popular downtown eatery scanned QR codes on table tents to view the menu, not realizing scammers had replaced the legitimate codes overnight. The fake codes led to a cloned website that looked identical to the restaurant's actual ordering system. Over a weekend, 47 customers entered their credit card information to pay for meals, with scammers immediately using the stolen data for fraudulent purchases averaging $2,300 per card before the restaurant discovered the switch.
A city parking enforcement scam involved fake violation notices placed on windshields with QR codes for 'convenient online payment.' The notices looked official with city logos and violation codes. Victims scanning the code were directed to a professional-looking payment portal requesting credit card details and driver's license numbers. Before authorities shut it down, the scheme operated for 11 days, collecting over $34,000 from approximately 180 victims who believed they were paying legitimate parking fines.