- DontGetGot.
- Posts
- Fake QR Codes : Another Phishing Tactic
Fake QR Codes : Another Phishing Tactic

eBook: How to minimize third-party risk with vendor management
A robust vendor management program isn’t just required by compliance frameworks like SOC 2 and ISO 27001. It’s also a critical part of a holistic trust management strategy.
Implementing a vendor management program, however, has become more complex and challenging with the proliferation of SaaS tools and shadow IT. And many overstretched security teams are being asked to do more with less.
To stay compliant and secure — and deepen trust with customers and partners — security teams need a way to proactively manage vendor risk.
This guide from Vanta, the leading trust management platform, brings together perspectives from the frontlines of vendor security management. Get insights and best practices from security and compliance leaders.
Good Morning!
Welcome to another edition of Don't Get Got, our newsletter dedicated to keeping you informed about the latest cybercrimes. In this edition, we'll be discussing a growing concern: QR code scams.

QR codes are everywhere. You'll find them in restaurants serving as menus, on receipts for swift payments, scattered across parking lots, they are even found on product packaging, allowing consumers to quickly access information about the item they are purchasing. QR codes have become an integral part of our daily lives, providing convenience and efficiency in various aspects. With just a simple scan using a smartphone, these codes can lead us to websites, videos, contact information, or even provide discounts and promotions. As technology continues to advance, QR codes are likely to become even more prevalent, offering endless possibilities for businesses and consumers alike.
However, cybercriminals have also recognized the potential of QR codes as a tool for their malicious activities. Fraudulent QR codes are designed to redirect you to malicious websites, fake payment portals, or phishing pages. Once you've taken the bait, scammers can exploit your personal information, unleash malware, or worse – drain your bank account.

Spotting the Scam: Your QR Code Survival Guide
So, how does this happen? Scammers can easily generate their own QR codes and plaster them wherever they think people will scan without a second thought. It could be on flyers, posters, or even strategically placed stickers. The unsuspecting victim scans the code, believing they're accessing legitimate information, only to find themselves in the clutches of a con artist.
Avoid falling prey to fraudulent QR codes:
Verify the Source: Before scanning any QR code, ensure it comes from a legitimate source. If you're in doubt, use your smartphone's camera app instead of a QR code scanner app to preview the URL before visiting the site.
Scrutinize the URL: After scanning, take a moment to inspect the destination URL. If it looks suspicious or doesn't match the context, abort the mission.
Use Trusted Apps: Stick to well-known and reputable QR code scanner apps. Avoid downloading random apps that promise extra features – they might come with unwanted surprises.
Stay Wary of Promotions: Be cautious when scanning QR codes promising unbelievable deals or discounts. If it seems too good to be true, it probably is.
At "Don't Get Got," we're on a mission to empower you against the ever-evolving cybercrime industry. Our hustle is your safety, and we've got some exciting updates in the pipeline to fortify your defenses.
Stay tuned, stay vigilant, and most importantly, share this newsletter with friends and family. The more we know, the safer we are in.
Cheers to staying informed & Don't Get Got!
eBook: How to minimize third-party risk with vendor management
A robust vendor management program isn’t just required by compliance frameworks like SOC 2 and ISO 27001. It’s also a critical part of a holistic trust management strategy.
Implementing a vendor management program, however, has become more complex and challenging with the proliferation of SaaS tools and shadow IT. And many overstretched security teams are being asked to do more with less.
To stay compliant and secure — and deepen trust with customers and partners — security teams need a way to proactively manage vendor risk.
This guide from Vanta, the leading trust management platform, brings together perspectives from the frontlines of vendor security management. Get insights and best practices from security and compliance leaders.
P.S. Your experiences matter. If you've encountered a scam/hack or have insights to share, we invite you to connect with us. Let's build a community that stands against cyber threats.
Email us : [email protected]