Be careful with QR codes! This is how they can scam you in restaurants and establishments with 'Qrishing'

The advancement of new technologies brings new possibilities that years ago seemed like science fiction, such as opening a restaurant menu by simply scanning a QR code through a device and saving the need to have the menu printed on paper.

Oliver Thansan
Oliver Thansan
19 November 2023 Sunday 16:13
13 Reads
Be careful with QR codes! This is how they can scam you in restaurants and establishments with 'Qrishing'

The advancement of new technologies brings new possibilities that years ago seemed like science fiction, such as opening a restaurant menu by simply scanning a QR code through a device and saving the need to have the menu printed on paper. .

However, with these possibilities also come crimes related to them such as the so-called 'Qrishing', a "phishing variant through which specially constructed QR codes are used to direct those who scan them to fraudulent pages and/or with malware", such as and as defined by Miguel López, General Director of Barracuda Networks.

The short time that this scam has been in operation does not make it uncommon to be able to suffer from it: “Although it is still relatively new, the truth is that its use by cybercriminals is already quite common due to its ease of use and the high rate. of success that it registers,” explains the expert.

The reasons why Qrishing is expanding so quickly could be explained by this, according to López: “As a result of the pandemic, we have become accustomed to scanning QR codes frequently and we do not stop to think about where each QR comes from, we do it almost without thinking… In the end a QR is nothing more than a link that takes us to some place and we should treat it like any suspicious link,” he says.

On the other hand, the head of Barracuda Networks recalls that "if we add to this that many mobile devices do not have adequate security tools, the result is predictable", which means that we will end up being a victim of unwanted cyber attacks on our smartphones.

“The problem is that anyone can replace the QR on the letter (or on an advertisement at a bus stop, for example) with a sticker with a QR that leads to a fraudulent page. The problem is not that restaurants or any other entity use QRs but rather the security measures that mobile device users implement and the use they make of those devices,” López highlights.

In this sense, the expert recalls that “that is why it is so important that citizens become aware of the vulnerabilities to which they are exposed” and that “cybersecurity training is essential at all levels, Qrishing is a clear example; Without knowing what it is, no one is going to stop and think that a cybercriminal has put a sticker with a malicious QR on a restaurant.”

However, "if a citizen knows that this possibility exists, at least they will look a little more when scanning it and there will be many who put barriers on their devices", improving the security of their device and avoiding the cyberattacks that are increasingly sought. more varied and complex methods.

Cybersecurity training is essential for both individuals and companies, as López points out, which is why it is increasingly common to look for professional profiles that know how to defend devices against these innovative virtual crimes.

With the Master in Cybersecurity you train to establish protection of computer systems, networks and devices against cyber threats, including data theft, espionage, malware, phishing, denial of service attacks, among others.

The Master in Cybersecurity (developed by Deloitte) aims to train you in topics such as cyber intelligence, malware, ethical hacking or monitoring. It is aimed at both recent university graduates in technical areas who want to focus their professional career in the field of computer security, and at professionals in the sector who need a higher level of specialization.

The Master's Degree in Cybersecurity will teach you the use of the most avant-garde tools in the Computer Security sector such as Kali Linux, Fortify, Sandas GRC, Foca or eMarisma and you will be able to conclude your master's degree with a double degree, specializing in Industrial Cybersecurity.