Quick response (QR) codes are a popular marketing, sales, payment and customer service tool for several businesses. However, as the presence of QR codes has become more prevalent, malicious actors have found ways to use them in phishing attacks and to spread malware.

These vulnerabilities can lead to significant financial and reputational damage, and it is essential for businesses to be aware of and mitigate these risks. This article provides more information on QR codes and their risks and offers tips on addressing the hazards they present.

What are QR codes?

QR codes are a series of pixels arranged to form a large square that contains a long string of data. They function similarly to a barcode. They can be scanned by code readers or smartphones and often contain URLs so individuals can access websites without having to type in a specific web address. Once scanned, QR codes allow a quick and convenient way for clients to access a business’s information or leave a review. They can also be used to prompt users to take certain actions, such as making a payment or downloading an app.

QR codes can be placed on various items such as posters, flyers, menus or billboards. They can also be included as images in digital communications sent through email or messaging apps.

The risks of QR codes

Although they can be a useful tool, the nature of QR codes allows them to be exploited by cybercriminals. Since legitimate QR codes appear as a random scramble of pixels within a larger square, it can be difficult for users to differentiate between the safe and malicious ones. Additionally, QR codes may be standalone images, so they may not be accompanied by telltale signs of malicious activity, as is often the case with fraudulent emails (e.g., misspellings, suspicious links).

Businesses encounter risks from QR codes in a couple of ways: They are exposed to cybersecurity threats if an employee scans a malicious QR code, and if a company utilizes QR codes for business purposes, their legitimate codes can be manipulated by cybercriminals, potentially impacting their customers and their business’s reputation.

Examples of how cybercriminals can exploit QR codes include:

Once the fraudulent QR code is scanned, a user may be vulnerable to various security issues, including:

Mitigating the risks of QR codes

As cybercriminals increase their use of QR codes, it is essential for businesses to mitigate the risks associated with them. Strategies include the following:

Businesses wishing to use QR codes can also take steps to protect their customers. Techniques to consider include:

Conclusion

QR codes provide a useful function, but they can also serve as an entry point for malicious individuals to steal credentials, insert harmful software, and compromise the security of an organization and its customers. This can lead to significant financial losses and reputational damage. By implementing risk reduction strategies, companies can protect their business, employees and clients.

For more information on these and other cybersecurity-related questions, please contact your Preferred Loss Control Consultant.

This Cyber Risks & Liabilities document is not intended to be exhaustive, nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. ©2023 Zywave, Inc. All rights reserved.