FBI Warns of QR Code Cybercrimes

FBI Warns of QR Code Cybercrimes

The FBI is warning the public that cybercriminals have been tampering with Quick Response (QR) codes to redirect victims to malicious sites that steal their login and financial information, according to a Tuesday (Jan. 18) public service announcement.

    Get the Full Story

    Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required.

    yesSubscribe to our daily newsletter, PYMNTS Today.

    By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions.

    “Businesses use QR codes legitimately to provide convenient contactless access and have used them more frequently during the COVID-19 pandemic,” the announcement stated. “However, cybercriminals are taking advantage of this technology by directing QR code scans to malicious sites to steal victim data, embedding malware to gain access to the victim’s device and redirecting payment for cybercriminal use.”

    Cybercriminals can tamper with both digital and physical QR codes, replacing legitimate codes with malicious ones, according to the announcement. The fraudulent QR codes may also contain embedded malware that allow cybercriminals to access to the victim’s mobile device and steal personal and financial information, allowing them to steal money from the victim’s accounts.

    Cybercriminals can also replace QR codes used by businesses for payments with a tampered QR code and redirect the sender’s payment to the criminal’s account, the announcement stated.

    “While QR codes are not malicious in nature, it is important to practice caution when entering financial information as well as providing payment through a site navigated to through a QR code,” according to the announcement. “Law enforcement cannot guarantee the recovery of lost funds after transfer.”

    Cybercrime isn’t going away any time soon, and it’s getting more sophisticated every day. Last year, hackers from North Korea swiped close to $400 million in cryptocurrencies in at least seven cyberattacks that targeted investment firms and centralized exchanges, with 58% being ether and just 20% being bitcoin.

    Advertisement: Scroll to Continue

    Rad more: North Korean Hackers Swiped $400M in Crypto Last Year

    The fraudsters made use of phishing lures, code exploits, malware and advanced social engineering to funnel the funds from connected “hot” wallets into addresses controlled by the Democratic People’s Republic of Korea (DPRK), then laundered the money and cashed out.