Subscribe
About

Think before you scan – QR codes are a potential cyber risk

By Simeon Tassev, MD and QSA at Galix
Simeon Tassev.
Simeon Tassev.

QR codes are nothing new – they have been around since 2004 – but with the increased availability of smartphones, which can scan these two-dimensional bar codes with their built-in cameras, QR codes have become increasingly popular. They can be used to make payments, download menus in restaurants, for general marketing purposes and a multitude of other applications. They can also be used by cyber criminals and malicious actors to steal personal and payment-related information, so it pays to be a little more aware.

Convenience is the killer

QR codes are, by design, incredibly user-friendly. These days, we see them everywhere. They are on the back of consumer products and we can scan them to get more information. They are in restaurants so we can scan them to view the menu without touching a physical menu card. They are used to enter competitions, in children’s books to access online content. They are also used by various apps to allow small business vendors to accept credit card payments.

The risk is that, while smartphones can read the QR code, humans cannot, so we have no idea where the code will direct us to. We could easily be clicking on an infected link, a spoof website or even just paying the wrong vendor. Opening a QR code could trigger an executable file or potentially malicious code, which can then be used by cyber criminals to steal personal information, including payment data.

Think before you scan

The issue here is not with the QR codes themselves, or with the payment apps, because these are both secure and mature technologies. The trouble is that QR codes are easy to generate – this can be done for free online – which means that genuine codes can easily be replaced by fake ones, leading people to links that look legitimate, or that are legitimate but send payment to the wrong vendor.

For example, at a market, vendors will have QR codes to scan and pay, but they often have strange names, or multiple businesses use the same payment application code. This makes it very easy for a malicious actor to replace the real code with their own, effectively stealing money from these vendors. Similarly, QR codes for downloading menus, entering competitions or other marketing exercises, can easily be replaced by fake codes that look real, but lead people to infected links or spoof sites where personal information is voluntarily entered and then stolen.

Be aware of the risk

The biggest risk around QR codes is that we use them in scenarios where we are not necessarily paying attention to, or thinking about, cyber security. They are easy and convenient, and even children can use them. However, they can also be abused, so we need to be aware of the risk.

If possible, verify the payment before you process it – check with the vendor that you are paying the right person, visit links directly through your browser, or use an alternative method where possible. Have endpoint security on your devices to protect you from malicious content. Most of all, be mindful. QR codes are fun, easy and convenient, but they are vulnerable to abuse, and we need to be aware. You wouldn’t just click a link in an e-mail without checking, so why scan a QR code without verifying it first.

Galix is a display sponsor of the annual ITWeb Security Summit 2022 to be held at Sandton Convention Centre in Sandton, Johannesburg on 31 May and 1 June 2022 and at Century City Conference Centre, Cape Town on 6 June 2022. In an increasingly connected, digital world, cyber security threats are constantly evolving and increasing in number and sophistication. Security professionals need to be up to speed with the latest technologies, techniques and skills for predicting and mitigating potentially crippling cyber attacks, the methods and tools in use by today's threat actors, and the latest legal and compliance demands. ITWeb Security Summit 2022, now in its 17th year, will again bring together leading international and local industry experts, analysts and end-users to unpack the latest threats facing African CISOs, CIOs, security specialists and risk officers, demystify emerging cyber security strategies in AI, blockchain, IOT, DevSecOps and more, and explain how to increase an organisation's cyber resiliency. Register today.

Share


Editorial contacts

Simeon Tassev
Galix Group
(086) 124 2549
simeon@galix.com
Lovejoy Shangase
Evolution PR
(083) 262 2565
lovejoy@evolutionpr.co.za