A new wave of phishing techniques has been targeting multiple industries. Anyone heard of ‘Quishing’?
Phishing links within emails are not a new problem, with the most common email lures often coming in the form of a request to update bank or payment details, updating personal details, or concerning account security.
These lures are often accompanied with social engineering. Commonly, threat actors threaten fines or account closures, sometimes even law enforcement involvement to encourage victims to engage.
However, a new spin on the phishing campaign has seen in increase just recently – and it’s been given the nickname ‘quishing’ (QR + phishing = quishing).
Threat actors are employing QR codes within their emails or attachments that re-direct users to a spoofed page.
Another method is changing a legitimate QR for a malicious version without the owner’s knowledge, or using a third-party QR scanner app which can also lead to a malicious domain.
In recent weeks, researchers have identified an increase in malicious QR codes being embedded within emails or attachments in lieu of traditional links. The code directs users to a fake, but convincing, webpage, for example a Microsoft page requiring log in credentials. Unlike simple links, these codes are more likely to reach a victim’s inbox as they are more difficult to detect as malicious.
There has even been reports of fraudulent QR code 'stickers' replacing the legitimate QR code on car park pay stations and on restaurant tables that provide a payment method via the code. The sticker covers the genuine code, meaning any payment will go to the criminal and not the official vendor. Always check to see if a QR code is legitimate. For example, can it be peeled off? If it can, do not use it and report it accordingly.
QR codes became increasingly popular during the Covid-19 pandemic, with a huge array of companies using them to interact with their customers – from restaurants replacing physical menus with online versions to medical centres allowing customers to provide feedback of services easily.
The risk for compromise is relatively low if the QR code is received onto a mobile phone as there doesn’t seem to be a way to execute a QR code without physically scanning it. However, if these codes can be scanned from another copy, it’s encouraged to exercise the same caution as would be given to suspicious or unexpected URLs.
To learn more about phishing, quishing, smishing etc, and to get your staff up-to-speed with the latest threats to your business, talk to us about Security Awareness Training. Your staff can be the first barriers against a cyber attack.
Reporting
Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to report@phishing.gov.uk. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).
Commenti