facebook-pixel

QR Code Phishing Scams: How to Stay Safe in 2026

L
Lunyb Security Team
··9 min read

QR code phishing scams, often called "quishing," are one of the fastest-growing cyber threats of 2026. Attackers exploit the trust we place in those familiar black-and-white squares, redirecting victims to fake login pages, malware downloads, or fraudulent payment portals. This guide explains how QR code phishing works, the most common attack types, and exactly how to stay safe.

What Are QR Code Phishing Scams?

QR code phishing (quishing) is a social engineering attack where criminals embed malicious URLs inside QR codes to trick victims into visiting harmful websites. Because the human eye cannot read a QR code, victims have no way of knowing where it leads until they have already scanned it — and by then, their browser may already be loading a fake page designed to steal credentials, payment details, or install malware.

Unlike traditional email phishing, quishing bypasses many corporate email filters because the malicious link is hidden inside an image. The FBI, INTERPOL, and national cybersecurity agencies have all issued warnings about the rise of QR code fraud, with reported losses now in the hundreds of millions of dollars globally.

Why QR Code Phishing Is Exploding in 2026

Several trends have made quishing especially effective:

  • Mass adoption. QR codes became mainstream during the COVID-19 era for menus, payments, and check-ins, training users to scan without thinking.
  • Mobile-first attack surface. QR codes are almost always scanned on phones, which often have weaker security tools than desktops.
  • Filter evasion. Email gateways struggle to inspect URLs hidden inside image-based QR codes.
  • Trust transfer. A QR code on official-looking signage borrows the trust of the location or brand it appears to come from.
  • Hard-to-verify destinations. Shortened URLs hidden inside QR codes obscure the final domain.

How a QR Code Phishing Attack Works

Most quishing attacks follow a predictable five-step pattern:

  1. Bait creation. The attacker designs a convincing message — a parking fine, package delivery notice, MFA reset request, or restaurant menu.
  2. Malicious URL generation. They register a lookalike domain (e.g., microsft-login.com) and create a phishing page mirroring the real one.
  3. QR code embedding. The malicious URL is encoded into a QR image, often layered over a legitimate-looking sticker or PDF.
  4. Distribution. The QR code is emailed, printed on flyers, stuck over real codes on parking meters, or posted in public places.
  5. Credential or payment harvest. Once scanned, the victim lands on a fake page that captures usernames, passwords, card details, or installs a malicious app.

The 7 Most Common QR Code Phishing Scams

1. Parking Meter and EV Charger Stickers

Criminals print fake QR stickers and place them over the real ones on parking meters or EV charging stations. Drivers scan, "pay" through a fake portal, and lose both their card details and the parking fee.

2. Fake Delivery Notices

A card left at your door claims a package couldn't be delivered. The QR code leads to a fake courier site requesting a small "redelivery fee" — and your full card number.

3. Restaurant Menu Swaps

Attackers stick a fake QR over the legitimate menu code. Diners scan and are asked to "log in with Google" or pay a deposit through a phishing page.

4. Corporate MFA Reset Emails

Employees receive an email claiming their multi-factor authentication needs to be reconfigured. The embedded QR code leads to a fake Microsoft 365 or Okta login. This is the #1 enterprise quishing vector in 2026.

5. Cryptocurrency Donation Scams

Charities, livestreams, or social posts display QR codes for crypto donations — except the wallet address belongs to the scammer.

6. Fake Government Fines

Letters claiming to be from tax authorities, traffic police, or immigration services include QR codes for "immediate payment."

7. Wi-Fi Network Joins

A QR code in a café claims to connect you to free Wi-Fi but instead installs a malicious certificate or routes traffic through an attacker-controlled network.

Quishing vs. Traditional Phishing: Key Differences

Factor Email Phishing QR Code Phishing (Quishing)
Primary deviceDesktop/laptopMobile phone
URL visibilityVisible on hoverHidden until scanned
Email filter detectionHighLow (image-based)
Endpoint protectionStrong on corporate devicesOften weak on personal phones
Attack locationInbox onlyInbox, physical world, signage
Victim awarenessHigherLower — QR codes feel "safe"

10 Practical Ways to Stay Safe From QR Code Phishing

  1. Preview the URL before opening. Modern iOS and Android camera apps show the destination URL after scanning — read it carefully before tapping.
  2. Look for tampering on physical signs. Stickers placed over original printed codes are a major red flag, especially on parking meters and ATMs.
  3. Never enter credentials after scanning a QR code. If a code asks you to "log in" to Microsoft, Google, or your bank, close it and visit the site manually.
  4. Type URLs manually for payments. Pay parking, fines, or deliveries by going directly to the official website or app — never through a scanned code.
  5. Use a trusted URL shortener and inspect short links. If a QR resolves to a shortened URL, use a link preview tool first. Reputable platforms like Lunyb let you scan link safety and view the final destination before visiting.
  6. Enable phishing protection on your phone. Safari, Chrome, and Edge all have built-in "deceptive site" warnings — make sure they are turned on.
  7. Don't install apps via QR code. Always go to the official Apple App Store or Google Play to download apps.
  8. Verify QR codes in emails. Treat every QR code in an email the same way you would treat a suspicious link — with skepticism.
  9. Use phishing-resistant MFA. Hardware keys (FIDO2/WebAuthn) and passkeys cannot be phished even if you accidentally enter credentials on a fake page.
  10. Adopt a zero-trust mindset. Assume any unsolicited code or link is hostile until verified. For more on this principle, read our guide to the Zero Trust Security Model.

Red Flags: Signs a QR Code May Be Malicious

  • The code is on a sticker rather than printed directly on the surface.
  • The destination URL uses a misspelled or unusual domain (e.g., paypa1.com, amaz0n-pay.net).
  • You're asked to enter login credentials, full card details, or your Social Security/National Insurance number.
  • The page demands urgent action — "verify within 1 hour or lose access."
  • The site asks you to download a profile, certificate, or app from outside the official store.
  • The QR code appears in an unsolicited email, especially with no other body text.

What to Do if You've Already Scanned a Malicious QR Code

If you suspect you fell for a quishing attack, act within minutes — speed matters:

  1. Disconnect. Turn off Wi-Fi and mobile data immediately to stop any in-progress download or session hijack.
  2. Don't enter anything else. Close the browser tab and any apps that opened.
  3. Change passwords. Reset credentials for any account you may have entered, starting with email and banking. Use a different device if possible.
  4. Revoke active sessions. Log out of all sessions in your account security settings.
  5. Contact your bank. If you entered card or banking information, freeze the card and request a replacement.
  6. Run a malware scan. Use a reputable mobile security app to check for malicious profiles or apps.
  7. Report it. Notify your IT team (if work-related), the brand being impersonated, and your national cybercrime authority (e.g., IC3 in the US, Action Fraud in the UK).
  8. Watch for follow-up scams. Victims often receive secondary "recovery" scams — be skeptical of anyone offering to retrieve lost funds.

How Businesses Can Protect Employees and Customers

Organizations are now the primary target of corporate quishing campaigns. Defensive priorities include:

  • Email security upgrades. Deploy gateways with image-based OCR scanning that can extract URLs from QR images.
  • Phishing-resistant MFA. Roll out passkeys or hardware tokens to eliminate credential theft as an attack path.
  • Branded, trackable QR codes. Use official short domains so employees and customers can recognize legitimate links at a glance.
  • Regular awareness training. Include quishing scenarios in simulated phishing exercises.
  • Physical site audits. Inspect printed materials, signage, and customer-facing QR codes for tampering.

Choosing a link platform with built-in scam detection matters too. See our breakdown in Best Free Bitly Alternative 2026 and our detailed Lunyb vs Bitly comparison for platforms with strong safety features.

The Bigger Privacy Picture

QR phishing is just one piece of a wider ecosystem in which your personal data is constantly tracked, leaked, and resold. Even without falling for a single scam, your online activity is being correlated through methods like browser fingerprinting, and your contact information is often being traded by data brokers — making it easier for attackers to craft believable, targeted quishing lures. Reducing your overall data footprint makes every type of phishing harder to pull off.

Pros and Cons of Using QR Codes (When Done Right)

Pros

  • Fast, frictionless access to information and payments
  • Great for offline-to-online conversion in marketing
  • Reduce typos when sharing long URLs
  • Work across all modern smartphones without an app

Cons

  • Destination is hidden until scanned
  • Easy to tamper with in physical environments
  • Bypass many traditional email filters
  • Users tend to trust them more than typed links

Frequently Asked Questions

Can simply scanning a QR code infect my phone?

In almost all cases, no — scanning alone just opens a URL. The danger comes from what you do next: entering credentials, downloading an app, or installing a configuration profile. Modern phones require user action before installing anything, so staying alert after the scan is your strongest defense.

How can I tell if a QR code sticker has been tampered with?

Look for stickers placed over printed codes, peeling edges, mismatched paper or ink quality, and codes that look freshly added compared to surrounding signage. On parking meters, ATMs, and EV chargers, legitimate codes are usually printed directly onto the device or laminated permanently.

Are QR codes in emails always dangerous?

Not always, but they should be treated with extra caution. Many legitimate brands now avoid QR codes in emails because attackers have abused them so heavily. If you receive one — especially related to MFA, password resets, or payments — verify the request by going directly to the company's website or app.

What's the safest way to scan a QR code?

Use your phone's built-in camera app (not a third-party scanner), preview the URL before tapping, and never enter sensitive information on a page reached only via QR. For payments, always type the URL or use the official app instead.

Do antivirus apps protect against QR phishing?

Mobile security apps with web protection can block known phishing domains after you scan, but they can't catch brand-new attack sites. Combine them with safe browsing settings, phishing-resistant MFA, and personal vigilance for layered protection.

Final Thoughts

QR codes are not inherently dangerous — but the trust we extend to them is being weaponized. By pausing to read each URL, refusing to log in or pay through scanned codes, and adopting phishing-resistant authentication, you can sidestep nearly every quishing attempt. In a world where attackers print scams onto stickers and slip them into your inbox, a half-second of skepticism is your best security tool.

Protect your links with Lunyb

Create secure, trackable short links and QR codes in seconds.

Get Started Free

Related Articles