Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

Diving into QR code phishing attacks

An example of a QR Code that is used during QR Code phishing attacks

There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will think that the link behind that win a lottery QR code is a deadly link that is bound to rob them off their privacy and even cause a loss sometimes

I don’t blame anybody for not knowing this because current technology is speeding like a city trench; new ideas pop up every day.

The perception humans have about QR codes is quite beautiful. No one easily thinks that what is behind that QR code is dangerous. Because QR codes are mostly used by serious organizations that deal with serious business. The scammers are not sleeping and they know that the best way to steal or destroy is by disguising what seems right and making it wrong. For example, if a huge company like Riham is giving out offers through a QR code, everybody scans to win. What hackers do is as well copy the source code of Riham, create a phishing link with it, and then paste it behind a QR code

QR Codes are best for hiding disguised links. If you place a cursor on a link inside a QR code, it rarely highlights the actual link you are being led to especially when the link has been scanned by a mobile phone. This makes it easy for you to just click on the link and have your information stolen

How is QR Code phishing done?

A hacker makes a phishing link the usual way, purchases a hosting package at a cheaper price or even at a free cost and a fake domain name. Domain names being cheap nowadays have made phishing easier. The hacker then copies code from a famously known site like LinkedIn, makes a little change to it and then uses the code editor in the website to paste the feck code. At the end of it all, the feck website is created and useful information is collected in the PHP database

Most hackers know nowadays that majority of the people know about phishing and so they have got the secret of hiding the code behind the QR Code. To make matters worse, there are sites that facilitate the free creation of QR Codes nowadays

Tech target’s definition of quishing(QR Code phishing)

You must follow the same procedures that help you overcome phishing in order to help you overcome QR code phishing attacks as well. I will list them below but will as well attach links to previous posts on the right of this article

  • Avoid scanning QR Codes from malicious sites
  • Copy the suspicious link and paste to a browser to view. Do not click on the link directly
  • Do not fill in your information in the feck site provided

QR code phishing attacks are a reality you should not ignore but be aware of. If you need a training on digital security, please visit the main page of this site and you will find a form to fill in

Click the link below to access the home page

https://circumventteching.com/2023/10/31/keeping-phones-secure
https://circumventteching.com/2024/02/02/how-to-install-the-tor-browser-on-your-computer/

Leave a Reply

Your email address will not be published. Required fields are marked *

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

How to recover a hacked Whatsapp Account; 2 ways

Hello, it has been a long time sharing with you something about digital security. During the time I …

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

1 2 3 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *