By: Karrie Westmoreland
QR codes were the unassuming heroes of the pandemic. No menus? No problem—just scan. Need to check in, download, verify, or pay? There’s a code for that. They were fast. Frictionless. Ubiquitous.
And cybercriminals noticed.
In 2024 and 2025, the humble QR code has become one of the most effective social engineering delivery mechanisms out there. They’re simple to deploy, hard to scrutinize, and perfect for bypassing traditional security defenses.
Welcome to the world of quishing—QR code phishing.
Let’s say you’re walking into your office building. A poster on the wall says your VPN client needs an urgent update. Scan the QR code to install the patch.
Seems official. Branded. Convenient.
You scan the code on your personal phone—because hey, it’s your phone—and a site opens, slick and familiar. You tap to log in with your work credentials.
Except that site? It’s fake. And you just handed your credentials over to an attacker.
That’s quishing in action.
Other flavors include:
Once you scan, the trap is sprung.
They Bypass Email Security Filters
QR codes embedded in emails or PDFs can sidestep link scanning, firewalls, and spam filters. There's nothing suspicious in the message—until the QR leads you outside the castle.
They Exploit Personal Devices
Most users scan with their phones—not their work computers. That means attackers bypass endpoint detection tools, URL filters, and other corporate defenses entirely.
They Look Legitimate
A QR code doesn’t raise the same red flags as a sketchy URL or unknown attachment. Plus, many users assume the physical presence of a code means it's been vetted. Spoiler: it hasn’t.
They Blend Physical and Digital
Social engineering thrives when trust is assumed. A printed poster or a real-world item feels authentic—especially when it’s branded, timed (e.g., “required by July 15”), or placed in a familiar space.
Unlike email phishing—where skepticism is (finally) increasing—QR codes haven’t triggered the same mental alarms.
There’s a curious psychological loophole here: when something appears in the physical world, our brains treat it as more trustworthy. Posters, flyers, signs—they feel real. And if you’ve ever scanned a QR code on a receipt without blinking, you’ve felt this too.
Attackers are exploiting that split-second of blind trust.
Here are a few true-to-life scenarios that made headlines or quietly infiltrated companies:
These aren't theoretical. They happened. And they're accelerating.
Let’s be honest: QR codes aren’t going away. But trust? That’s got to be earned, not assumed.
Here’s how to stay ahead:
Train employees to pause and think before they scan. Especially when the source is unclear or the QR arrives via email, text, or Slack.
Digitally verify physical signage. If your organization uses printed materials with QR codes, have a way to verify legitimacy—like a corporate intranet list of active QR links.
Use branded, secure URLs. Instead of generic short links, use URLs that clearly belong to your organization, so users can spot fakes more easily.
Invest in mobile threat detection (MTD). If employees use phones to access work apps or data, MTD tools can detect malicious redirects, apps, and behaviors.
Design for suspicion, not convenience. Build a culture where people expect to verify—whether it’s a voice call from the CEO or a QR code on the fridge.
QR codes aren’t the enemy. But assuming they’re harmless? That’s a mistake.
Just like email and SMS, QR is now part of the attacker’s toolkit. And the moment we forget that—or treat scanning as a low-risk action—we give threat actors exactly what they want.
The scam isn’t in the code. It’s in the trust.