Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Quishing - The dangerous QR codes of the scammers
Phishing Simulation

Quishing - The dangerous QR codes of the scammers

Quishing is a modern way to obtain sensitive information. We explain the procedure and the danger!

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: March 21, 2025 3 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

Quishing is phishing via malicious QR codes that embed harmful links, often obfuscated with URL shorteners. Unlike email phishing, quishing codes are typically printed and physically distributed, limiting reach but increasing perceived legitimacy when placed in plausible contexts like parking meters or restaurant check-ins. Pandemic-era normalization of QR codes made people less suspicious of scanning them. Defense includes using QR scanner apps with URL preview functionality and training employees through phishing simulations that incorporate physical QR code distribution. Research from DePaul University has documented real-world quishing campaigns.

Table of Contents (3 sections)

The corona pandemic is a veritable goldmine for scammers and phishers, with testing centers emailing test results and registration requests, vaccination appointments being confirmed online, and follow-ups being filled out online. A new scam has developed here - Quishing, phishing via QR codes. Why did this method emerge and how popular is it?

How does Quishing work?

Quishing uses a QR code that contains a malicious link. This link can additionally be obfuscated with a URL shortener. The methods of disguise here are no different from classic phishing via e-mails. In contrast to this, however, the QR code is usually printed, because sending it by e-mail or to cell phones is not particularly plausible.

This results in a major disadvantage of quishing compared to phishing: the number of potential victims is significantly smaller. If you consider the effort of printing and distributing the codes with the number of people reached, phishing beats quishing by a long way here.

However, criminals are not prevented from incurring these expenses. In the States (Texas), tampered QR codes were discovered on parking station. The website links to a page that is not from an official source. It is not clear from the official statement whether an existing QR code was pasted over or the functionality was faked by criminals.

We have become accustomed to QR codes

The digital vaccination record, contact tracing, check-ins - QR codes have entered our lives more clearly than ever as a result of the corona pandemic. The fact that you have to register to visit a restaurant is no longer unusual, depending on the given restrictions regarding corona. Even in the current situation where registration is no longer required to visit a restaurant, most are used to QR codes and how they work.

If the QR code is placed in a plausible place and in a logical context, it looks serious and more trustworthy than an email. These advantages are the reason for the emergence and use of quishing among fraudsters. A smaller number of casualties can be expected, but the amount of damage is unpredictable and depends on the context.

The protection against quishing

A core element in the protection against quishing is the QR code scanner used. Many apps display a preview of the embedded code:

  • Apple has implemented a QR code scanner out-of-the-box.
  • For Android devices exist several approaches. Depending on the phone brand a code scanner may need to be downloaded manually from the Play Store.

We strongly recommend that you pay attention to the preview function when installing a QR code scanner. Since quishing differs mainly by the communication medium but has the same goal as phishing, this aspect can be captured and trained by new training methods such as running a phishing simulation. Here it is conceivable that codes are distributed as flyers in the company under investigation, placed in rooms or other meaningful places.

The researchers Sharevski et. al. from DePaul University in the USA have published an interesting paper on this subject,"Gone Quishing: A Field Study of Phishing with Malicious QR Codes". It can be viewed free of charge at arxiv.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV