QR codes went from a curiosity to infrastructure almost overnight. Pandemic-era contactless menus made them ubiquitous in restaurants. Parking meters use them. Event tickets are them. Marketing campaigns, product packaging, healthcare forms — you scan QR codes dozens of times a month now without thinking about it.

Attackers noticed. A technique called quishing (QR code phishing) has grown significantly as a result. The FBI issued warnings about it in 2022 and 2023. Reported incidents have continued to climb since.

What quishing is

A QR code is just a visual encoding of a string of text — almost always a URL. When you scan it, your phone opens that URL. You generally don’t see the URL before your browser opens it. That’s the attack surface.

In a quishing attack, an attacker replaces or overlays a legitimate QR code with one pointing to a malicious URL. The malicious site typically looks identical to the legitimate destination — a bank login page, a parking payment portal, a package delivery confirmation screen — and asks for credentials or payment information.

Why it bypasses email security. Most corporate email security filters scan links in emails for known malicious URLs. A QR code embedded in an image is just a pattern of squares — automated tools can’t read it the same way. Quishing emails often sail through filters that would catch a typed malicious link.

Where it happens in the real world

Quishing attacks show up in several patterns:

How to protect yourself

The good news is that the protective habits are straightforward once you know what to look for:

For businesses that use QR codes

If you generate QR codes for customer-facing use, a few practices reduce your exposure to your QR codes being spoofed:

Generate a static QR code that never expires No server dependency, no redirect, no account needed
Open QR Code Generator →