Quishing is a type of phishing attack that uses QR codes to trick you into giving up personal info or installing malware on your phone.
Phishing is when someone tries to trick you into giving up personal info (passwords or credit card numbers, etc.) by pretending to be a trusted source, like your bank or a company you use. It usually comes in the form of fake emails, texts, or websites that look real but are designed to steal your info. Think of it like digital bait on a hook, they’re just waiting for you to bite.
Instead of sending a sketchy link through email or text, attackers slap a malicious QR code on a poster, email, or even a fake delivery notice. When you scan it, it might send you to a fake login page, trigger a malware download, or steal your credentials.
It’s a newer twist on an old hustle, and it works because people trust QR codes more than they should, especially when they’re in public places or part of something that looks official.
Operatives know better than to scan random QR codes without verifying the source but most people don’t think twice about it.
That’s what makes Quishing dangerous. There’s no immediate sign that something’s wrong, and most of the time, the browser on your phone just auto-loads the page, giving you zero time to react. Plus, these attacks can be hyper-targeted. Some actors customize the fake pages to look exactly like your bank or workplace login. It’s slick and low-cost; just print, stick, and wait for someone to scan.
That’s the real danger with Quishing, it blends right into everyday life. You’re in a rush at a parking meter, trying to access a menu at a restaurant, or scanning a delivery update at your front door. It’s all designed to catch you with your guard down.
The attacker doesn’t need you to download anything sketchy or click a suspicious link from a shady email, they just need you to scan. And if they’ve done their recon right, the fake site or prompt looks completely legit. This kind of attack leans heavily on human behavior, and that’s why it works.
Key things to watch out for:
Check for tampering. Look for QR code stickers placed over existing ones, classic sign someone swapped the original.
Don’t scan from untrusted sources. Avoid codes on random flyers, lamp posts, or suspicious packages.
Always preview the URL. If your scanner doesn’t show the link before launching it, get one that does.
Watch for misspellings or weird domains. A link like mybnk-login.co isn’t your bank, it’s a trap.
Stay calm under pressure. If a QR code message creates urgency (like “Your account will be deleted!”), it’s probably bait.
Smart tradecraft means knowing how attackers operate. Stay skeptical, stay alert, and don’t let convenience be your blind spot.
Quishing Defense Basics
Always treat QR codes like you’d treat a random USB drive lying on the street, don’t trust it unless you know where it came from. If you see a QR code on a flyer, poster, or package, especially in a public place, think twice before scanning it.
Better yet, go to the official website yourself instead of relying on the QR code. When you do scan one, always check the URL that pops up before clicking through. If it looks sketchy or unfamiliar, back out immediately.
To reinforce that mindset, quick habits that’ll keep you clear of trouble:
Use a dedicated QR scanning app that previews URLs before opening them, don’t rely on your phone’s default camera.
Cross-check with official sources. If you’re scanning a code from a bill, sign, or delivery notice, verify it matches what’s on the company’s official website or app.
Look at the surroundings. If a QR code is slapped on in an odd spot, looks tampered with, or is placed where it doesn’t belong, skip it.
Attackers count on people scanning without thinking. You cut their plan off at the knees by just pausing to evaluate. Doesn’t take more than a few seconds, and it could save you a world of headaches.
Lock Down Your Phone’s Behavior
Disable automatic actions for QR scans if your device has that option. Some phones auto-open URLs after scanning, which is exactly what Quishing actors bank on. Get a QR reader that previews the link before launching it, giving you the chance to assess whether it’s legit. Basic digital hygiene, like keeping your phone updated and running security software, adds another layer of protection too.
How to harden your phone against Quishing traps:
Turn off auto-open features in your camera or QR apps, force the device to ask before launching a site.
Install reputable mobile security apps that flag malicious links or sketchy behavior in real time.
Keep your OS and apps updated. A lot of exploits used in Quishing rely on old vulnerabilities that patches already fixed.
These aren’t overreactions, they’re baseline protection. In the field, you don’t leave your gear unguarded. Same goes for your phone. It’s your digital identity, and Quishing is just another attempt to hijack it.
Stay Sharp on Social Engineering Tricks
Quishing often works because it’s bundled with urgency, like a fake delivery notice or a QR code saying your parking’s about to get towed. This psychological pressure is a classic manipulation tactic in tradecraft. Recognize it and pause. If someone’s trying to rush you into scanning a QR code, odds are high it’s a setup.
How to spot the manipulation before it grabs you:
Keep reading with a 7-day free trial
Subscribe to The Tradecraft Guide to keep reading this post and get 7 days of free access to the full post archives.