Skip to main content

How Hackers are Taking Advantages of QR Codes.


Despite


eliminating the need to type a URL on your smartphone and explore new innovative ways of engagement, marketers were forced to admit defeat and retire their obsession with quick-response (QR) codes. But a decade later, the two-dimensional barcode enjoyed somewhat of a renaissance as the low-touch economy began to take shape.

From proving your vaccination status in a nightclub or large event to ordering your food in a restaurant and even connecting to a new Wi-Fi network, QR codes thrived as consumers increasingly demanded contactless convenience. It took a global pandemic for mainstream audiences to embrace QR codes. According to Juniper Research, more than 1.5 billion people have used them globally, and cybercriminals are already leveraging this trend.

The types of cyberthreats hiding in QR codes.


Most people will have witnessed phishing attempts that trick users into clicking on nefarious links in their emails. QR code-related threats work in a similar way.

One technique is QRLjacking, and attackers use every trick in the book by leaving codes on walls, buildings, and even computer screens that direct users to a malicious site. It could be as simple as placing a sticker on a bus stop advising passengers to scan so they can download an urgent government app update.

Quishing is another method that directs unsuspecting victims to a fake version of a popular website and prompts users to enter their login details.

Although these attacks are easy to set up, they often avoid detection from security systems that are scanning the content of emails for harmful text rather than suspicious barcodes.


As a result, some attackers use both email and QR codes to bypass corporate defences and steal Microsoft 365 usernames and passwords.

Another attack method involves cybercriminals setting up a free Wi-Fi network for anyone that scans the QR Code. This so-called honeypot attack enables attackers to silently steal data such as stored banking and credit card information. There are also more primitive methods, such as replacing QR codes in public places with an alternative sticker that re-directs users to harmful online content.

The Army Criminal Investigation Command’s Major Cybercrime Unit advised that scanning malicious QR codes can also add nefarious contacts to their contact list without their knowledge. But things can quickly escalate when completing telephone calls to premium telephone numbers or sending payments to a destination that cannot be recovered.

Think before you scan


The easiest way to stay safe is not to scan QR codes. Unfortunately, this is increasingly becoming impractical. Before contemplating scanning a QR code in public, take a few moments to verify the company looks legitimate. Does the URL you arrive at match what you are expecting? Any requests to immediately provide personal information or payment details should be avoided for obvious reasons.

If you are sent a QR code in an email, remember to greet it with the same suspicion you have with any links embedded in a message.


In addition, home users should ensure that they install security updates to their devices as soon as they become available rather than selecting ignore or remind me later (you know who you are).

Although most people would never open links sent from strangers or unsolicited messages, when it comes to scanning a code on a lamppost, many are guilty of letting their cyber defences down without even realizing it. The dangers of scanning codes without thinking serve as a timely reminder that everyone needs to be streetwise, both online and offline.

Protecting corporate devices


Business owners and IT administrators have three significant challenges. Firstly, they need to regularly perform integrity checks on their sites and apps, ensure their QR codes have not been hacked, and always display the correct information and links. Secondly, every corporate device should have multi-factor authentication along with a robust mobile defence solution that automatically blocks phishing attempts, phone take-overs, and unauthorized downloads.

Finally, every employer needs to arm its employees with training and awareness around cybersecurity best practices.


When combined, these three areas of focus can play a significant role in improving the security posture across the entire organization while also adding a layer of protection for staff when they are away from the office.

Just like phishing attempts and ransomware attacks, QR codes have been around for well over a decade. But their new mainstream status is increasingly making these small barcodes a top vector for cyberattacks. Although these mobile shortcuts can save time, they can also open users to sophisticated or crude cyberattacks with just one wrong scan.

The arrival of COVID 19 is also responsible for the new ubiquity of the QR code and a successful tech comeback story. However, because they have become so commonplace, users have become a little too relaxed when scanning them. With attacks predicted to increase exponentially throughout 2022, maybe we should all think before scanning the next QR code we encounter.


#Cybernews


#osutayusuf

Comments

Popular posts from this blog

We Bring You Brief Series of Sanctions Against Uganda Government Officials.

📸: Gen Abel Kandiho. On 9-December-2021, USA slapped sanctions against the then CMI Commander Gen Abel Kandiho. 📸: Gen Kale Kayihura. On 9-December-2022, UK slapped sanctions against former Police Boss Gen Kale Kayihura. 📸: Commissioner General of Prisons, Johnson Byabashaija. Again on this 4-December-2023, the same USA has slapped sanctions against Uganda Prisons Commander Johnson Byabashaija over alleged torture and human rights abuses in Prisons across Uganda. We ask, has USA and UK made December as an LCM to slap sanctions against high ranking government officials in Uganda even when the sanctions just remain on paper without deeper investigations to ascertain logical conclusions or remedy to that effect ?. #iip_updates  #Information_is_Power  #we_inform_the_uninformed

WHERE IS MINISTER OF SEX SIMON LOKODO?. (He deserves a battle of soda from me! Ministe`r esalanga mabee. He is quick to run after Mrs Dr Stella Nyanzi and other Opposition elements. Government aza aza edo zuu vaa kpere bua). Anyway, below is the article! POLICE OFFICER AKOL ESTHER CHARGED OF BEING A PUBLIC NUISANCE Naughty Officer Officer who embarrassed police after leaking nude photo charged 13.03.2018 She serves in the 'Very Important Persons Protection Unit'  Akol Esther  (Courtesy) A female police officer whose nude photo surfaced on social media has been charged of being a public nuisance. Akol Esther serves in the Very Important Persons Protection Unit (VIPPU) of the police force. Kampala Metropolitan Police spokesperson Luke Owoyesigire says Akol Esther might be demoted or expelled from the police force if found guilty of circulating nude photos. Police court is yet to announce date when Akol Esther is expected to appear for a hearing. This comes at a time when Pornography Control Committee is taking tough measures against persons circulating pornography content. The committee warned and promised to arrest persons who will circulate pornographic content.

POLICE OFFICER AKOL ESTHER CHARGED OF BEING A PUBLIC NUISANCE Naughty Officer Officer who embarrassed police after leaking nude photo charged 13.03.2018 She serves in the 'Very Important Persons Protection Unit' Akol Esther  (Courtesy) A female police officer whose nude photo surfaced on social media has been charged of being a public nuisance. Akol Esther serves in the Very Important Persons Protection Unit (VIPPU) of the police force. Kampala Metropolitan Police spokesperson Luke Owoyesigire says  Akol Esther might be demoted or expelled from the police force if found guilty of circulating nude photos . Police court is yet to announce date when Akol Esther is expected to appear for a hearing. This comes at a time when Pornography Control Committee is taking tough measures against persons circulating pornography content. The committee warned and promised to arrest persons who will circulate pornographic content.

How to Host a Website for Free From Your PC or Laptop.

Why pay for a web hosting service when your old computer can do the same thing? Learn how to self-host your site. If you're planning to launch a website but don't want to pay recurring monthly or annual hosting fees, you can use any old laptop or desktop PC to host a website for free. It's a great way to utilize your old system instead of throwing it away. In this guide, we will install and set up services on our 10-year-old laptop to host a WordPress, Joomla, or custom HTML or PHP-based website with a free SSL certificate. MAKEUSEOF VIDEO OF THE DAY Things You Will Need to Host a Website Following are the pre-requisites to host a website for free from home with just your computer: An old laptop or PC running Ubuntu Server. A registered domain name for your website Ethernet cable to connect the laptop or PC to router for reliable and fast connection Step 1: Update and Upgrade the Packages After  installing Ubuntu Server on your computer , execute the following c