Quishing: A growing threat hiding in plain sight


Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.


However, legitimate organizations aren’t the only ones generating QR codes for added convenience. Cyber criminals are also leveraging QR codes and the increased reliance on near-field technology (NFC) to launch sophisticated attacks on unsuspecting victims.


What is quishing, and how does it work?


The Federal Trade Commission (FTC) has reported a rising trend in new phishing schemes where scammers use seemingly legitimate QR codes to send users to malicious websites and applications to carry out various cyberattacks. Termed “quishing,” these techniques can be highly effective, especially when the generated codes are posted in credible places like retail products, business buildings and branded marketing locations like magazines or mailers.


How are quishing attacks carried out?


The reason why quishing attacks have become so effective has to do with the impulsivity associated with scanning QR codes due to user convenience, the ease at which codes can be generated and the anonymity they provide.


Anyone can create a QR code online using a range of free available tools. Since all QR codes look similar in design, there is no telling what a QR code will prompt a devi ..

Support the originator by clicking the read the rest link below.