Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

Diving into QR code phishing attacks

An example of a QR Code that is used during QR Code phishing attacks

There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will think that the link behind that win a lottery QR code is a deadly link that is bound to rob them off their privacy and even cause a loss sometimes

I don’t blame anybody for not knowing this because current technology is speeding like a city trench; new ideas pop up every day.

The perception humans have about QR codes is quite beautiful. No one easily thinks that what is behind that QR code is dangerous. Because QR codes are mostly used by serious organizations that deal with serious business. The scammers are not sleeping and they know that the best way to steal or destroy is by disguising what seems right and making it wrong. For example, if a huge company like Riham is giving out offers through a QR code, everybody scans to win. What hackers do is as well copy the source code of Riham, create a phishing link with it, and then paste it behind a QR code

QR Codes are best for hiding disguised links. If you place a cursor on a link inside a QR code, it rarely highlights the actual link you are being led to especially when the link has been scanned by a mobile phone. This makes it easy for you to just click on the link and have your information stolen

How is QR Code phishing done?

A hacker makes a phishing link the usual way, purchases a hosting package at a cheaper price or even at a free cost and a fake domain name. Domain names being cheap nowadays have made phishing easier. The hacker then copies code from a famously known site like LinkedIn, makes a little change to it and then uses the code editor in the website to paste the feck code. At the end of it all, the feck website is created and useful information is collected in the PHP database

Most hackers know nowadays that majority of the people know about phishing and so they have got the secret of hiding the code behind the QR Code. To make matters worse, there are sites that facilitate the free creation of QR Codes nowadays

Tech target’s definition of quishing(QR Code phishing)

You must follow the same procedures that help you overcome phishing in order to help you overcome QR code phishing attacks as well. I will list them below but will as well attach links to previous posts on the right of this article

  • Avoid scanning QR Codes from malicious sites
  • Copy the suspicious link and paste to a browser to view. Do not click on the link directly
  • Do not fill in your information in the feck site provided

QR code phishing attacks are a reality you should not ignore but be aware of. If you need a training on digital security, please visit the main page of this site and you will find a form to fill in

Click the link below to access the home page

https://circumventteching.com/2023/10/31/keeping-phones-secure
https://circumventteching.com/2024/02/02/how-to-install-the-tor-browser-on-your-computer/

Leave a Reply

Your email address will not be published. Required fields are marked *

6 effective tips for checking phishing links

Tools for checking phishing links Phishing links have traditionally been used to steal people’…

7 sure ways on how to protect a website from spam

Having a huge number of spam comments and registrations on your WordPress site can be extremely anno…

6 signs of a Facebook hacked account

Most victims of hacking get to realize that their Facebook account was compromised after over a mont…

3 free tips on how to recover a hacked facebook account with changed email and password?

The present-day hackers go as far as changing the email and password associated with a Facebook acco…

3 Good Phishing attack examples

One of the most recent phishing attacks is the UNICEF Phishing campaign that has consumed money from…

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

1 2 3 4 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *