Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Corrupted QR Codes Pose Threat to Businesses, Universities
    Cyber Security Awareness Month Tip

    Corrupted QR Codes Pose Threat to Businesses, Universities

    By Sofia CoraOctober 4, 20222 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    QR codes or Quick Response codes are essentially barcodes with extra data and they’ve exploded in popularity in the past two decades. Booths at the university club fair, event flyers, and even social media websites all utilize QR codes. Now that most phones have the capabilities for reading QR codes, hackers have found ways to exploit QR codes for malicious content.

    QRL Jacking

    Quick Response Code Login Jacking is used on websites that allow users to sign in by scanning a QR code. While QR code sign in optimize one time password and multifactor authentication capabilities, it is prone to vulnerabilities. A hacker can clone the QR code and login page and send it to a user, once the user scans in, the hacker can now control the users account. This is a simple yet extremely effective social engineering hack

    Attackers could additionally place fraudulent QR codes over real ones that phish a user into giving over sensitive information.

    Potential Malware in QR Codes

    Last January, Fordham Secure IT published a blog on an FBI alert sent out warning of bad actors planting malware into QR codes because of how popular they had become over the pandemic as a contactless option for menus, flyers, and event tickets. Always be cautious of any URLs from QR codes, especially those which ask you to input payment and/or other sensitive information.

    How You Can Stay Safe Using QR Codes

    • Don’t scan random QR codes: Bad actors can distribute malicious QR codes with the hopes that people’s curiosity will cause them to scan. Avoid scanning QR codes form untrusted sources.
    • Use a dedicated QR Scanner: While most phone cameras can scan QR codes on their own, scanning apps will specifically examine QR codes before redirecting the user to ensure you aren’t being lead to a malicious link.
    • Or avoid QR codes altogether: Asking for and inputting a URL directly into your browser is almost always more secure than following a QR code which involves third parties. This is best practice even for general web browsing, typing the URL directly into the search bar is better than accidently using URL spoofed or scam websites.

    Sources:

    • Qrljacking | OWASP Foundation
    • Beware the square: how to spot malicious QR codes – Sophos News
    • Cybercriminals Tampering with QR Codes to Steal Victim Funds (fordham.edu)

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Covid-19 Cybersecurity Awareness Month Tip Cybersecurity Month QR social engineering
    Previous ArticleStrong Passwords for Cybersecurity Awareness Month
    Next Article Phone Call Scams

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d