20 December 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

540Posts 1,362,288Views 59Comments

QR Codes Could Deliver Malware

26 March 2012  |  1860 views  |  2

You’ve seen barcodes all your life. So you know what they look like: rectangles “boxes” comprised of a series of vertical lines. When a cashier scans a barcode, you hear a familiar beep and you are charged for that item.

A QR code looks different and offers more functionality. QR stands for “quick response.” Smartphones can download QR readers that use the phone’s built-in camera to read these codes. When the QR code reader application is open and the camera detects a QR code, the application beeps and asks you what you want to do next.

Today we see QR codes appearing in magazine advertisements and articles, on signs and billboards; anywhere a mobile marketer wants to allow information to be captured, whether in print or in public spaces, and facilitate digital interaction. Pretty much anyone can create a QR codes.

Unfortunately, that’s where the cybercriminals come in. While QR codes make it easy to connect with legitimate online properties, they also make it easy for hackers to distribute malware.

QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus.

Here’s some ways to protect yourself from falling victim to malicious QR codes:

Be suspicious of QR codes that offer no context explaining them. Malicious codes often appear with little or no text.

If you arrive on a website via a QR code, never provide your personal or log in information since it could be a phishing attempt.

Use a QR reader that offers you a preview of the URL that you have scanned so that you can see if it looks suspicious before you go there.

Use complete mobile device security software, which includes anti-virus, anti-theft and web and app protection and can warn you of dangerous websites embedded in QR codes.

TagsSecurityRisk & regulation

Comments: (3)

Brett King - Moven - New York | 26 March, 2012, 14:48

So could this link. Doesn't mean all links or URLs are evil...

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano - IDTheftSecurity.com - Boston | 26 March, 2012, 14:54

Correct, but most people dont look at a QR code as a link. So heads up. 

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Ketharaman Swaminathan - GTM360 Marketing Solutions - Pune | 27 March, 2012, 19:14

Agree with your suggestion #s 1, 2 and 4.

However, re. your suggestion #3, "Use a QR reader that offers you a preview of the URL that you have scanned so that you can see if it looks suspicious before you go there.", since it's customary to construct QR codes out of shortened URLs, I'm not sure how one can figure out if the URL looks suspicious or not. For example, a QR code for this blog post page (http://www.finextra.com/community/fullblog.aspx?blogid=6371) could be constructed out of its shortened version http://goo.gl/szlRT, which neither looks genuine nor suspicious.

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Social Media Identity Theft leads to Arrest

19 December 2014  |  652 views  |  0  |  Recommends 0 TagsSecurity

Card Company's boosting Payment Security with Mobile

18 December 2014  |  944 views  |  0  |  Recommends 0 TagsSecurity

Chip and PIN, will It save Us?

17 December 2014  |  868 views  |  0  |  Recommends 0 TagsSecurity

Russian Hackers getting rich from your Identity

10 December 2014  |  1258 views  |  0  |  Recommends 0 TagsSecurity

Chip and PIN vs. Chip and Signature Cards

08 December 2014  |  1302 views  |  1  |  Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who is commenting on Robert's posts

Iain Montgomery
Otmane EL RHAZI
Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Paul Love
Mike McCormack