Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

Diving into QR code phishing attacks

An example of a QR Code that is used during QR Code phishing attacks

There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will think that the link behind that win a lottery QR code is a deadly link that is bound to rob them off their privacy and even cause a loss sometimes

I don’t blame anybody for not knowing this because current technology is speeding like a city trench; new ideas pop up every day.

The perception humans have about QR codes is quite beautiful. No one easily thinks that what is behind that QR code is dangerous. Because QR codes are mostly used by serious organizations that deal with serious business. The scammers are not sleeping and they know that the best way to steal or destroy is by disguising what seems right and making it wrong. For example, if a huge company like Riham is giving out offers through a QR code, everybody scans to win. What hackers do is as well copy the source code of Riham, create a phishing link with it, and then paste it behind a QR code

QR Codes are best for hiding disguised links. If you place a cursor on a link inside a QR code, it rarely highlights the actual link you are being led to especially when the link has been scanned by a mobile phone. This makes it easy for you to just click on the link and have your information stolen

How is QR Code phishing done?

A hacker makes a phishing link the usual way, purchases a hosting package at a cheaper price or even at a free cost and a fake domain name. Domain names being cheap nowadays have made phishing easier. The hacker then copies code from a famously known site like LinkedIn, makes a little change to it and then uses the code editor in the website to paste the feck code. At the end of it all, the feck website is created and useful information is collected in the PHP database

Most hackers know nowadays that majority of the people know about phishing and so they have got the secret of hiding the code behind the QR Code. To make matters worse, there are sites that facilitate the free creation of QR Codes nowadays

Tech target’s definition of quishing(QR Code phishing)

You must follow the same procedures that help you overcome phishing in order to help you overcome QR code phishing attacks as well. I will list them below but will as well attach links to previous posts on the right of this article

  • Avoid scanning QR Codes from malicious sites
  • Copy the suspicious link and paste to a browser to view. Do not click on the link directly
  • Do not fill in your information in the feck site provided

QR code phishing attacks are a reality you should not ignore but be aware of. If you need a training on digital security, please visit the main page of this site and you will find a form to fill in

Click the link below to access the home page

https://circumventteching.com/2023/10/31/keeping-phones-secure
https://circumventteching.com/2024/02/02/how-to-install-the-tor-browser-on-your-computer/

Leave a Reply

Your email address will not be published. Required fields are marked *

5 easy tips for hacked Facebook account recovery

Are you currently having a hacked Facebook account or are worried about your account being hacked in…

How to safely open a suspicious link

Suspicious links could lead to the theft of information or even cause severe damage to your device. …

7 dangerous types of phishing attacks

There are various types of phishing attacks. However, in this article, we will determine the most co…

16 effective ways of fighting phishing

Phishing has become a famously practiced evil in the current day internet. Today I just want to give…

7 great tips for WordPress backend protection

When it comes to how to wordpress backend protection, every developer has their method. The success …

5 severe horrible dangers of location sharing in Africa

It is a common trend for us to get so excited about places, events, clothes, and everything. With th…

1 2 3 4 5 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *