Threat actors have much success in crafting plausible content on SMS text, email or published media that less aware users may click on or through embedded links to access seemingly legitimate web pages and potentially enter sensitive details that are harvested and used against individuals and organisations. The introduction of Quick Response (QR) codes in 1994, enables users to simply scan 2-dimensional bar-coded images with a camera enabled device to interact with richer services and information behind the image. With the straightforward ability for tampering with published codes through stick on overlays having now become a prevalent technique to hijack the original intended purpose and harvest user information. According to one source, the QR phishing (Quishing) threat has increased by over 2400% since May 23.
Both email Phishing and Scanned Quishing techniques or combined approaches attempt to lead a victim to a malicious website where login credentials and personal information can be stolen. Commonly there is an urgency or request for help that does not follow normal business process. Once credentials are harvested, they may be sold on or used for criminal activity.
Common signs to watch out for are:
- Unexpected emails or messages
- Poor use of native language that may be generic and contain poor grammar and typos in any message text
- Poor image quality
- Unrecognizable URL
- Suspicious websites
Users should consider undertaking security awareness training to understand the risks, ensure their device software is kept up to date and has anti-virus software installed and should be encouraged to think before giving out personal information unless certain the webpages and need are legitimate. If in any doubt report to business security teams or law enforcement authorities.
Please remember that reputable companies do not send unsolicited mail requesting that you provide sensitive information!