Skip to Content

Cybersecurity Knowledge Base

CyberPedia


Your essential guide to cybersecurity threats, attacks, and defenses. Understand the risks. Protect your business.

Quishing


Overview

Quishing is a type of phishing attack that uses QR codes to trick victims into visiting malicious websites or performing unwanted actions, instead of clickable links in email or messages. In plain terms: quishing is phishing via QR code, counting on people to scan codes with their phones without scrutinizing the destination.

How Quishing Works

In a quishing attack, adversaries typically:

  • Embed a malicious URL inside a QR code, often leading to a fake login page, malware download, or credential-harvesting site.

  • Deliver the QR code via email, chat, PDFs, printed materials, or posters, sometimes disguised as legitimate notices (for example, “update your account,” “view your secure message,” or “parking payment”).

  • Rely on victims scanning the code with a smartphone camera or app, then entering credentials or approving actions on the malicious site.

Common Quishing Scenarios

Examples include:

  • Fake account or MFA prompts

    • Emails that say “scan this QR code to securely log in” or “reset your MFA,” redirecting to a lookalike login portal that steals credentials.

  • Payment or invoice lures

    • QR codes claiming to link to invoices, package tracking, or bill payment pages that instead collect payment details or credentials.

  • On-premises posters or signs

    • Stickers placed over legitimate codes (for menus, Wi‑Fi, or building services) that silently redirect to attacker-controlled sites.

Why Quishing Works

Quishing is effective because:

  • QR codes hide URLs

    • Users cannot easily see or recognize the full URL before scanning, making it harder to spot suspicious domains.

  • Mobile devices are less scrutinized

    • People may be less cautious on phones, and security controls or URL previews might be weaker than on corporate desktops.

  • Perception of convenience and security

    • Framing QR codes as “secure login” or “fast access” can lower skepticism, especially in professional-looking emails or documents.

Risks and Impact

Successful quishing attacks can lead to:

  • Credential theft and account takeover

    • Stolen usernames, passwords, and sometimes MFA codes for email, VPN, or cloud services.

  • Financial fraud

    • Redirection to fake payment pages that collect card or banking information.

  • Malware installation

    • Links that prompt app or profile installs, or that exploit mobile browser weaknesses.

  • Business email compromise (BEC)

    • Compromised accounts used to send further targeted messages, approve fraudulent payments, or access internal data.

Key Protections (Plain-Language)

To reduce quishing risk:

  • Treat QR codes like links

    • Be cautious about scanning codes from unsolicited emails, unknown senders, or random physical locations.

  • Check the URL after scanning

    • Most phones show the destination URL; verify the domain carefully before entering credentials or payment details.

  • Use official apps and bookmarks

    • For critical services (email, banking, corporate portals), open apps or bookmarked URLs directly instead of trusting a QR code.

  • Harden email and web defenses

    • Configure filters and security tools to inspect images and attached documents for embedded QR codes and risky destinations where possible.

  • Educate users

    • Include quishing in security awareness training, with examples of fake “secure QR login” emails and rogue physical codes.

Examples