{"id":11977,"date":"2012-01-17T18:08:13","date_gmt":"2012-01-17T23:08:13","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=11977"},"modified":"2021-08-10T18:07:21","modified_gmt":"2021-08-10T22:07:21","slug":"qr-codes-can-put-users-at-risk","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/qr-codes-can-put-users-at-risk\/","title":{"rendered":"QR Codes Can Put Users at Risk"},"content":{"rendered":"<p style=\"text-align: left;\"><strong>-Updated 01-26-12-<\/strong> It was just a matter of time and now the <a href=\"https:\/\/web.archive.org\/web\/20160124012307\/http:\/\/www.websense.com:80\/content\/Home.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Websense<\/a> (<a href=\"https:\/\/www.forcepoint.com\/newsroom\/2016\/raytheonwebsense-now-forcepoint\" target=\"_blank\" rel=\"noopener noreferrer\">WBSN<\/a>) <a href=\"https:\/\/web.archive.org\/web\/20121105011223\/http:\/\/www.websense.com:80\/content\/ThreatSeeker.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ThreatSeeker Network<\/a> has started spotting spam messages that lead to URLs that use embedded QR codes. According to a <a href=\"https:\/\/web.archive.org\/web\/20120209031741\/http:\/\/www.net-security.org\/malware_news.php?id=1956\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> at <em>Help Net Security,<\/em> this is a clear evolution of traditional spammers towards targeting mobile technology. The spam email messages look like traditional pharmaceutical spam emails and contain a link to the Web site 2tag.nl. Once the 2tag.nl URL from the mail message is loaded in the browser, a QR code is displayed, along with the full URL. When the QR code is read by a QR reader, it automatically loads the spam URL.<\/p>\n<p style=\"text-align: center;\"><strong>&#8212;<\/strong><\/p>\n<p style=\"text-align: left;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104645\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-14.jpg?resize=85%2C85&#038;ssl=1\" alt=\"QR Codes Can Put Users at Risk\" width=\"85\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-14.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-14.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><strong>Quick Response codes (<a href=\"http:\/\/en.wikipedia.org\/wiki\/QR_Code\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">QR codes<\/a>)<\/strong> are a &#8220;new&#8221; type of <strong>barcode<\/strong> that can be used for a variety of purposes tracking, ticketing, labeling of products, etc. They<strong> can be put anywhere<\/strong>, in magazines, buses, websites, TV, tickets, and on almost any object which they might want to learn more about.<\/p>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104647 size-full\" title=\"QR code\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/rbachqr.png?resize=75%2C75&#038;ssl=1\" alt=\"QR code\" width=\"75\" height=\"75\" \/>Help Net Security<\/em> writes that when used for legitimate purposes, they make life easier for users. &#8220;All you need to &#8216;visualize such a code is a smartphone with a camera and a QR reader application to scan it \u2013 the code can direct you to websites or online videos, send text messages and e-mails, or launch apps,&#8221; <a title=\"www.bullguard.com\" href=\"https:\/\/www.bullguard.com\/bullguard-security-center\/security-articles\/malicious-qr-codes.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">point out<\/a> <a title=\"www.bullguard.com\" href=\"https:\/\/www.bullguard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BullGuard&#8217;s<\/a> researchers.<\/p>\n<p>Unfortunately, QR codes can just as easily be used to compromise users&#8217; mobile devices. <em>&#8220;Much like URL shortening services can be and are used maliciously because of the fact that they obscure the real target URL, QR codes can also be used for such deception,<\/em>&#8221; <a title=\"Joe Levy\" href=\"https:\/\/web.archive.org\/web\/20140409074301\/http:\/\/www.crunchbase.com\/person\/joe-levy\" target=\"_blank\" rel=\"crunchbase noopener noreferrer\">Joe Levy<\/a>, CTO of <a title=\"Solera Networks\" href=\"http:\/\/web.archive.org\/web\/20140401234349\/http:\/\/www.soleranetworks.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Solera Networks<\/a> <a title=\"www.darkreading.com\" href=\"https:\/\/web.archive.org\/web\/20130320142429\/http:\/\/www.darkreading.com:80\/mobile-security\/167901113\/security\/news\/232301147\/qr-code-malware-picks-up-steam.html\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a title=\"www.darkreading.com\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>DarkReading<\/em><\/a>. &#8220;<em>QR codes &#8230; provide a direct link to other <a title=\"www.wikinvest.com\" href=\"https:\/\/web.archive.org\/web\/20180907144717\/http:\/\/www.wikinvest.com:80\/concept\/Smart_phone\" target=\"_blank\" rel=\"noopener noreferrer\">smartphone<\/a> capabilities such as email, SMS, and application installation. So potential attack vectors extend beyond obscured URLs and browser exploits very nearly to the full suite of device capabilities.&#8221;<\/em><\/p>\n<p><a title=\"Mobile malware\" href=\"https:\/\/siliconangle.com\/2011\/11\/18\/are-mobile-malware-threats-actually-real\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-13002\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Mobile malware\" src=\"https:\/\/i0.wp.com\/siliconangle.com\/files\/2011\/01\/Mobile-Malware.jpeg.jpg?resize=85%2C85\" alt=\"Mobile malware\" width=\"85\" height=\"85\" \/><\/a>There are several ways attackers are already using <a title=\"ridethelightning.senseient.com\" href=\"https:\/\/web.archive.org\/web\/20210528050129\/https:\/\/ridethelightning.senseient.com\/2012\/01\/qr-code-malware-a-new-frontier-for-the-bad-guys.html\" target=\"_blank\" rel=\"noopener noreferrer\">malicious QR codes<\/a> to perpetrate their scams. A recent attack via QR code &#8220;Attaging&#8221; took place in Russia and involved a Trojan disguised as a mobile app called <a title=\"www.securelist.com\" href=\"https:\/\/web.archive.org\/web\/20140625014309\/http:\/\/www.securelist.com\/en\/blog\/208193145\/Malicious_QR_Codes_Pushing_Android_Malware\" target=\"_blank\" rel=\"noopener noreferrer\">Jimm<\/a>. Once installed, \u201cJimm\u201d sent a series of expensive text messages ($6 each), racking up unwanted charges.<\/p>\n<p>On\u00a0<a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"IOS (Apple)\" href=\"http:\/\/www.apple.com\/ios\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iOS<\/a> devices, hackers are sending users to websites that will jailbreak the device and install more malicious malware. Tomer Teller, security evangelist at <a title=\"Check Point Software Technologies\" href=\"https:\/\/www.checkpoint.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Check Point Software Technologies<\/a>, told <em>DarkReading<\/em>, &#8220;a<em> user scans a barcode and is redirected to an unknown website &#8230; the user phone will be jailbroken and additional malware could be deployed (such as key loggers and GPS trackers).<\/em>&#8221;<\/p>\n<p><a href=\"http:\/\/techcrunch.com\/2011\/06\/06\/android-malware-rears-its-ugly-head-yet-again\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104649 size-full\" title=\"Google Android\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/android_evilplus.jpg?resize=75%2C66&#038;ssl=1\" alt=\"Google Android\" width=\"75\" height=\"66\" \/><\/a>&#8220;<em>On the <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/www.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a>\u00a0 &#8230; Criminals are redirecting users to download malicious applications. All a user needs to do is scan a barcode and it will redirect to a website that will download the Android Application<\/em>&#8221; according to the article.<\/p>\n<p>In addition, attackers are using QR codes to redirect users to fake websites for phishing. &#8220;<em>A QR code will redirect to a fake Bank that will look exactly like your bank. Since most smartphone screens are small, a normal user may not see the difference and will type in his or her (information) and hand it to the attackers,&#8221;<\/em> Teller says. <a title=\"www.qrcodepress.com\" href=\"http:\/\/www.qrcodepress.com\/qr-code-readers-may-make-barcodes-less-attractive-to-consumers-due-to-privacy-issues\/854552\/\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to <a title=\"www.qrcodepress.com\" href=\"http:\/\/www.qrcodepress.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Mobile Commerce News<\/em><\/a> some apps, like the NeoReader from Neomedia, that collect personally identifiable information (<a title=\"\/www.eff.org\" href=\"https:\/\/www.eff.org\/deeplinks\/2009\/09\/what-information-personally-identifiable\" target=\"_blank\" rel=\"noopener noreferrer\">PII<\/a>). This information is then sent to third parties who mine the data and possibly resell it.<\/p>\n<p><a href=\"http:\/\/web.archive.org\/web\/20120923100212\/http:\/\/www.thephonetimes.com:80\/2011\/04\/simply-tap-to-make-mobile-payments-in-the-uk-easy-and-quick\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104651 size-full\" title=\"mobile QR based payment\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Mobile_Payments.jpg?resize=75%2C75&#038;ssl=1\" alt=\"mobile QR based payment\" width=\"75\" height=\"75\" \/><\/a>The trend to mobile QR-based payment systems from firms like <a title=\"www.thelevelup.com\" href=\"https:\/\/www.thelevelup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LevelUp<\/a>, <a title=\"www.kuapay.com\" href=\"https:\/\/www.kuapay.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kuapay,<\/a> and <a title=\"\/www.paypal.com\" href=\"https:\/\/www.paypal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Paypal<\/a> are developing will drive QR code malware forward Mr. Levy says. &#8220;As our mobile devices and our wallets continue to converge through such technologies as near field communications (<a title=\"www.wired.com\" href=\"https:\/\/web.archive.org\/web\/20120603002035\/http:\/\/www.wired.com:80\/epicenter\/2011\/05\/wired-nfc-faq\" target=\"_blank\" rel=\"noopener noreferrer\">NFC<\/a>), <a title=\"www.internetevolution.com\" href=\"https:\/\/web.archive.org\/web\/20131004200100\/http:\/\/www.internetevolution.com\/author.asp?section_id=617&amp;doc_id=231410\" target=\"_blank\" rel=\"noopener noreferrer\">Bump<\/a> and QR, malware authors are bound to prefer these very direct paths to the money. After all, these devices and apps are well on the road to becoming our new currency.&#8221;<\/p>\n<p>So how do you protect yourself and the data on your mobile?<\/p>\n<ul>\n<li>Download an app that scans QR codes and barcodes and shows the URL to which the codes want to take you. &#8220;Only use QR code reader software that allows the user to confirm the action to be taken i.e. visit a website link,&#8221;\u00a0Paul Henry, security and forensic analyst at <a title=\"Lumension\" href=\"http:\/\/www.lumension.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lumension<\/a> told <em>DarkReading<\/em>. &#8220;If you do not know and trust the link, cancel the action.<\/li>\n<\/ul>\n<ul>\n<li>The UK website <em><a title=\"2d-code.co.uk\/\" href=\"https:\/\/web.archive.org\/web\/20190827233240\/https:\/\/2d-code.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">2D Code<\/a><\/em> <a title=\"2d-code.co.uk\" href=\"https:\/\/web.archive.org\/web\/20170912032118\/http:\/\/2d-code.co.uk:80\/scan-qr-codes-safely\/\" target=\"_blank\" rel=\"noopener noreferrer\">recommends<\/a> QR Pal which has a feature called SafeScan which checks the URL a blacklist (<a title=\"market.android.com\" href=\"https:\/\/web.archive.org\/web\/20120303024402\/https:\/\/market.android.com\/details?id=com.qrpay.qrpal\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> and <a title=\"itunes.apple.com\" href=\"https:\/\/web.archive.org\/web\/20121111151512\/https:\/\/itunes.apple.com\/gb\/app\/qr-pal-qr-code-scanner-barcode\/id488113937\" target=\"_blank\" rel=\"noopener noreferrer\">iOS<\/a>).<\/li>\n<\/ul>\n<ul>\n<li>Do not scan QR codes from random stickers on walls and similar surfaces. <em>Help Net Security<\/em> says scammers are counting on people to do that because they can&#8217;t curb their curiosity.<\/li>\n<\/ul>\n<ul>\n<li>Consider installing a mobile security app on your device, especially if it runs the <a title=\"Android OS\" href=\"https:\/\/www.crunchbase.com\/company\/android\" target=\"_blank\" rel=\"noopener noreferrer\">Android OS<\/a>. &#8220;<a title=\"Android\" href=\"http:\/\/android-developers.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> is an open platform, which means that its source code can be examined by criminals and exploited easily when they find a weakness in, say, the Android browser,&#8221; according to the article. &#8220;That\u2019s why most malicious apps transmitted via QR codes target the Android-based smartphones.&#8221;<\/li>\n<\/ul>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I am not a fan of QR codes they seem to take you to an advertisement. Most of the destinations are fluff at best and dangerous at worst. Now that they have become nearly ubiquitous, they present more risk than necessary. Avoid QR codes.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/boston.cbslocal.com\/2011\/12\/26\/hackers-use-qr-codes-to-hijack-smartphones\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hackers Use QR Codes To Hijack Smartphones<\/a> (boston.cbslocal.com)<\/li>\n<li><a href=\"http:\/\/mobile.slashdot.org\/story\/11\/12\/30\/1727257\/malicious-qr-code-use-on-the-rise\" target=\"_blank\" rel=\"noopener noreferrer\">Malicious QR Code Use On the Rise<\/a> (mobile.slashdot.org)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>QR codes can be used to attack mobile devices they obscure the real target URL provide a direct link to smartphone functions like email SMS and app installs<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,202,1051,1052,536,92,860,23,951,876,4,129,1050],"class_list":["post-11977","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-android","tag-attaging","tag-check-point-software-technologies","tag-goog","tag-google","tag-ios-apple","tag-malware","tag-pii","tag-qr-code","tag-security","tag-smartphone","tag-uniform-resource-locator"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=11977"}],"version-history":[{"count":26,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11977\/revisions"}],"predecessor-version":[{"id":132121,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11977\/revisions\/132121"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=11977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=11977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=11977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}