"Quishing" you a Happy Holiday Season

QR Code phishing scams - What they are and how to avoid them.
Originally invented to keep track of car parts in the early 90s, QR codes have been around for decades.
Quishing, or QR Code phishing, exploits smartphone users scanning the 2D barcode, which leads to a phishing site, malicious link, or another cyber attack.
QR codes work precisely as malicious links; a victim who scans the QR code - typically using their smartphone - will be directed towards a malicious site.
The opposite is true with QR codes: there is typically no user-accessible way to check the destination before scanning.
Hiding URLs from users - QR codes provide criminals with a very effective mechanism for hiding suspicious URLs, making this an ideal way to bypass growing user skepticism concerning clicking questionable and shortened URLs.
Circumventing corporate controls - If users receive a QR-based phishing email on their work computer, they will likely scan the code using their phone.
Hiding URLs from security tools - Unlike Netcraft's advanced detection services, many security tools and systems cannot scan images, relying on text-based analysis to detect malicious links within emails, which means they can't see the links hidden in QR codes so that QR-based phishing emails can slip through.
In the following example, a QR code is included in an email purporting to be from Microsoft.
Figure 1 A phishing email targeting Microsoft includes a QR code that directs the victim to a malicious website.
It's worth noting that the criminal's deception includes a reference to 2FA. Setting up 2FA' is associated with improving online security and is often legitimately completed using QR codes.
The QR code directs the user to a phishing site that tricks the victim into entering their Microsoft login and password.
Figure 2 Phishing site designed to capture victims' Microsoft Account credentials.
The image within the email includes the QR code and text instructions.
On scanning the code, the victim is directed to another phishing site that attempts to steal Microsoft credentials.
Figure 3 A phishing email targeting DocuSign, which includes a QR code that directs the victim to a malicious website.
We'll analyze the email, extract the URL, and if it contains a link to a phishing site, we'll take that website down so it can't be used to trick other users.
Customers of Netcraft are automatically protected against QR code-based phishing attacks through our best-in-class threat detection.
Connect with the Netcraft team today to start protecting your team from quishing attacks and various other forms of phishing.
Book your demo here, or find out more by visiting our Guide to preventing phishing and other cyber attacks.


This Cyber News was published on www.netcraft.com. Publication date: Tue, 19 Dec 2023 12:13:04 +0000


Cyber News related to "Quishing" you a Happy Holiday Season

9 online scams to watch out for this holiday season - By being aware of these common online scams and taking precautions, you can protect yourself and your family from becoming victims this holiday season. The holiday season is upon us, and that means it's time to start shopping for gifts. It's not just ...
7 months ago Blog.avast.com
Most scammed items for this Christmas season - As the festive season is just a couple of days ahead, the joy of giving and receiving is accompanied by an unfortunate increase in scams targeting unsuspecting holiday shoppers. Scammers are adept at exploiting the spirit of generosity and the rush ...
6 months ago Cybersecurity-insiders.com
Preparing for the Holiday Ransomware Storm - Particularly in a subset of industries, these teams find their organizations squarely in the crosshairs of cybercriminals during the holiday period, looking to profit. These industries' increased time sensitivity, criticality, and importance during ...
6 months ago Securityboulevard.com
The 3 Most Prevalent Cyber Threats of the Holidays - As many of us deck the halls, some folks are preparing for the cybersecurity holiday season - that perilous time of year rife with breaches, attacks, and threats in far greater frequency than in any other time of year. The surge in cyber business is ...
6 months ago Darkreading.com
4 Tips for Safe and Secure Holiday Shopping - The holiday season is the most wonderful time of the year for experienced and novice cybercriminals alike looking to make a quick payday. Although threat actors are relying on classic scams to trick unsuspecting consumers this season, you can take ...
6 months ago Feeds.fortinet.com
Understanding Vishing and Quishing: Protecting Yourself Against Telephone and QR Code Scams - Employing tactics such as urgent requests or threats of repercussions, these scammers manipulate victims into compliance. A vishing scam might involve a caller impersonating a bank representative, claiming an account issue that necessitates immediate ...
1 month ago Cysecurity.news
The SANS Holiday Hack Challenge is back! The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. Webinar Whether you are considering a career in cyber security or you already work in the industry, the 2023 SANS Holiday Hack ...
6 months ago Go.theregister.com
Holiday Season Online Privacy Recipe - Make delicious sense of online cookies with Avast and get two signature holiday cookie recipes from chef Carla Hall. Aggressive advertisers can use them to track your every move online and sell your information. So now you know which cookies to ...
6 months ago Blog.avast.com
Christmas scams: Attacks to be aware of this holiday season - Now, not only has the victim been charged for this fake item, but the cyber criminal now has access to all their credit card information. Now more than ever, Christmas shopping is done online - and, of course, cyber criminals are going to take ...
6 months ago Securityboulevard.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
Cyber Monday Kicks Off Holiday Shopping Season With E-Commerce Security Risks - The post-Thanksgiving e-commerce shopping event known as Cyber Monday draws millions of consumers each year seeking out bargains online - to the tune of $11 billion in 2022. Amid the purchasing spree, consumers routinely share sensitive personally ...
7 months ago Darkreading.com
How To Protect A New Technology Purchase - Security advice for brand new devices this holiday season. The holiday season often brings the excitement of receiving or gifting the latest tech gadgets, from smartphones to laptops and internet-connected devices. The thrill of starting with a ...
6 months ago Blog.avast.com
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
Tax Season Alert: Common scams and cracked software - OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One ...
4 months ago Webroot.com
"Quishing" you a Happy Holiday Season - QR Code phishing scams - What they are and how to avoid them. Originally invented to keep track of car parts in the early 90s, QR codes have been around for decades. Quishing, or QR Code phishing, exploits smartphone users scanning the 2D barcode, ...
6 months ago Netcraft.com
QR Code Phishing Attacks Target High-Level Executives: Report - C-level executives and others in managerial positions are by far the top targets of increasingly popular phishing attacks that involve malicious QR codes. Bad actors know that if they can get into the email of a highly placed executive, it opens up ...
4 months ago Securityboulevard.com
Rise of OLVX: A New Haven for Cybercriminals in the Shadows - OLVX has emerged as a new cybercrime marketplace, quickly gaining a loyal following of customers seeking through the marketplace tools used to conduct online fraud and cyberattacks on other websites. The launch of the OLVX marketplace follows along ...
6 months ago Cysecurity.news
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Securityboulevard.com
5 Types of Crypto You Didn't Know Existed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Hackread.com
Lee County student Chromebooks hacked in 'Cyber Monday prank' - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Nbc-2.com
Google to Delete Inactive Gmail Accounts From Today - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
Particle Network's Intent-Centric Approach Aims to Simplify and Secure Web3 - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
Hacker IntelBroker Leaks Alleged Sensitive US DoD Documents - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
6 months ago Hackread.com
Bluetooth Vulnerability Enables Keystroke Injection on Android, Linux, macOS, iOS - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
6 months ago Hackread.com
Fake hotel reservation phishing scam uses PDF links to spread MrAnon Stealer - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
6 months ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)