QR codes are a popular and convenient way to share access to links and digital information. All you need to do is point your device's camera or use a reader app to scan it, and then open the encoded information. However, not being able to see what the QR code contains before scanning it has made it a popular tool for spreading malware and stealing personal information. Let’s learn how fake QR code scams work and how you can identify them.

Kamilė Vieželytė
November 17, 2025
Black Friday’s best price on identity theft protection
Get up to 70% off!
Get the Deal
30-day money-back guarantee
View promotion details.
A fake QR code is a code generated with a link to a malicious or spoofed website. “Fake” in this instance doesn’t mean that the code itself doesn’t work, but that it was created with bad faith. A person can scan the code as normal, and it will work. However, the content it leads to may be hijacked or deliberately created to mislead the user.
QR phishing, or quishing for short, involves using such bad-faith codes to redirect users to malicious websites or files. Similar to phishing emails or spam text messages, a quishing link can imitate a real service provider and prompt the user to input their login credentials, payment details, or other personally identifiable information. Cybercriminals can then use the stolen data for identity theft, ransomware, or other illicit activities.
QR code scams are on the rise because they can effectively bypass security filters that an email inbox would apply. Instead, a user can scan the code and open it on their browser without additional security checks.
The cycle of a QR code scam starts with a malicious website. Scammers create a page to gather and steal user data. They then create a fake QR code that links to this website. Alternatively, criminals might use DNS poisoning to redirect traffic from a legitimate website already encoded with a QR to the malicious website, thus spoofing the QR code itself.
Once the fake QR code is ready, the waiting game begins. Whether the scam succeeds or not depends solely on whether the user interacts with it. To increase the likelihood of the code being used, scammers can print it out and place it in public locations or use compromised email lists to send it to a broad range of targets.
When the user scans the link, they can choose to interact with the spoofed website. If they choose to open the link and interact with it, for example, by entering their personal information into the fields provided or selecting to download the files in the link, they reveal this data to the cybercriminals or infect their personal device with malware.
If the user enters personal data into the website, cybercriminals can use it to impersonate them, gain unauthorized access to their accounts, access their financial information, or sell the information on the dark web for profit. If the user downloads and opens a malicious file, cybercriminals can use it to gain backdoor access to the device, install keylogging software, infiltrate the device network, or otherwise compromise device security.
According to the QR code generation service QR Tiger, in 2023, quishing surged by 51%, with over 8,000 attacks observed between June and August of that year, showing a sudden increase in the threat. Detection of quishing scams is a massive problem. Since they can bypass email spam filters and the user may not check the link before opening it, less than 40% of quishing scams could be detected.
With more businesses using QR codes for marketing and communication purposes, the number is expected to continuously increase. Cybercriminals might use spoofed links or redirect traffic from links attached to legitimate QR codes to conduct their schemes. The lack of measures to detect and block false QR codes may also impact the efficacy of these scams.
Using QR codes maliciously is fairly simple because you can’t verify the code’s content before you scan it. For this reason, any code you come across is as likely to be a legitimate redirect or a guerrilla marketing campaign as it is a scam.
QR codes can be included in emails as attachments or images that the user can quickly scan to learn more. Likewise, some texting services can allow MMS messages containing QR codes. Sending fake QR codes over email or text can be an effective way to redirect the target to a phishing website. Since a QR code is easy to generate, it can be a low-stakes scam for the cybercriminals, allowing a quick and easy way to share a spoofed website with many users at once.
QR codes are a common way for users to share content on social media, especially on platforms where sharing links might be restricted. Some social media sites can automatically detect and flag scam links. Using an image of a QR code instead helps cybercriminals bypass this block and share their scam more efficiently.
QR codes in pop-up ads may be less effective than other scams because an adblocker might filter them out. However, they allow for a more effective way to get the users to access the scam link. Pop-up ads are usually interactive, meaning that the scammer can add a link not just inside the QR code but also make it accessible by just clicking the ad. The user then unintentionally opens the scam site and might interact with it, thinking it’s legitimate.
Sign-up forms are an easy way for cybercriminals to gather information they can use for different types of identity theft. A user scans the QR code and opens a sign-up form for a newsletter, subscription, or other service. They enter personal details, including their legal name, home address, and payment information, which cybercriminals can then access and use maliciously.
QR shopping scams typically focus on stealing financial information. A user scans the code expecting to receive a special discount or exclusive access to an item or service. They enter their payment details and delivery address. However, instead of receiving their desired item, they end up unwittingly submitting their financial information to criminals.
Restaurants often allow customers to scan QR codes to access the menu or pay the bill. Criminals can hijack the DNS traffic, redirecting it to a scam site that looks like the payment page. The customers then enter the payment information as normal, while the criminals gain their financial details, and the bill is left unpaid.
A common way to share a fake QR code is to print it out and place it in a public place, like a bulletin board or a street sign. Such flyers often contain very little information besides the code, making them indistinguishable from other QR codes. The aim is to get as much exposure as possible by placing the code in a public location for passers-by to scan it out of curiosity. If they scan the code and interact with its hyperlink, they may fall for the phishing scam.
Similar to public flyers, scammers may place letters containing fake QR codes directly in physical mailboxes. These letters can be part of broader scams. For instance, they may imitate legal documents, overdue payment warnings, or requests to provide further information. For the recipient’s “convenience,” these letters contain a QR code they can scan to access a quick way to make a payment or submit information. The scammer can then obtain this data and use it for identity theft, credit card fraud, or other criminal activities.
People often share QR codes to mine new cryptocurrency coins or access non-fungible tokens (NFTs). Fake codes used in crypto scams often contain malware and can be shared from one crypto wallet to another. For instance, a user might receive a file containing the QR code in their digital crypto wallet. Once they scan the code and open it, they download a file claiming to contain a token. If they interact with the file, hackers can overtake their device with malware and use it to steal assets in the wallet.
In some cases, scammers might create a fraudulent QR scanner app instead of using a specific code. The user installs the app and grants it a high level of permission to access the device. The app actually works as malware and is used to access internal files, keylog the user’s keyboard entries, and steal sensitive information.
A fake QR code isn’t easy to identify just from the outside. Each code consists of just black squares, with each creating a unique pattern that provides no information about what’s actually encoded inside. This means you can’t know what the code contains before you scan it.
However, you can see the signs of a fake QR code based on context clues surrounding it:
The QR code itself reveals little about its content before you scan it. However, you can use some context clues to tell if a QR code you’ve come across is safe or not. See if there’s external information surrounding the code, like a description of the service, its provider, and where the code redirects. If you can, double-check the website or service provider that’s advertised with the code. If you identify any of the aforementioned red flags or simply have doubts about the code’s security, avoid scanning and interacting with it.
Make sure you use a secure QR code reader. Your device may have a built-in reader with security features that can check the links before you open them. Be mindful of third-party scanners — check their reviews and user feedback before installing, in case they don’t offer security checks or are malware in disguise.
Simply scanning a fake QR code shouldn’t put your device or data at risk. However, the danger lies in actually interacting with the information encoded in the QR. If you open and interact with the website by downloading files it contains or entering your personal details, you could become a victim of a quishing scam.
If you only scanned the QR code but didn’t interact with it, you should be in the clear. Delete any screenshots or photos of the code from your device to avoid accidentally interacting with it in the future. However, if you scanned the QR code and interacted with the encoded content or downloaded and opened a suspicious file, you should immediately take security precautions.
You should treat quishing attacks similar to other online scams and follow the best practices to protect your personal information as quickly as possible. By acting proactively, you improve your chances of preventing identity theft.
QR code scams can be unpredictable and hard to identify. However, you can protect your personal information from quishers by using reliable security tools and keeping your data in check.
Holiday scams
are up.
Prices are
down.
Save 70% on identity theft
protection today
Get the Deal
30-day money-back guarantee
View promotion details.
Kamilė is curious about all things compliance. She finds the prospect of untangling the complicated web of cybersecurity legislation satisfying and aims to make the nuances of identity theft prevention approachable to all.
Black Friday’s best price on identity theft protection
Get up to 70% off!
Get the Deal
30-day money-back guarantee
View promotion details.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.