Quishing is an emerging threat that we all need to be aware of in today’s digital world.

In our daily lives, we rely on technology for everything, from everyday tasks to financial transactions.
However, cyberthreats continue to evolve, and although many are already familiar with phishing and ransomware, quishing is a new tactic that is rapidly gaining ground and often goes unnoticed.

Imagine this: you're at a café in the center of Seville, enjoying a quiet afternoon, and you decide to scan a QR code to view the menu. Without giving it a second thought, you scan the code and, in the blink of an eye, your personal information could end up in the hands of cybercriminals.
This is the danger of quishing, and it is crucial that we stay informed and prepared to protect ourselves.
QR codes are no longer as safe as we once thought.
As a cybersecurity specialist at ABD Consultoría y Soluciones Informáticas, I have seen how cybercriminals constantly adapt to new technologies to bypass even the most advanced security measures.

Quishing is a clear example of how traditional fraud tactics are merging with new communication tools. If you’ve ever scanned a QR code without thinking twice, this article is for you.
What is Quishing?
Quishing is an emerging threat that combines traditional phishing with the growing popularity of QR codes. This attack takes a different approach from classic phishing, where cybercriminals attempt to deceive victims through fake emails or messages.

Quishing, on the other hand, takes advantage of the growing use of QR codes to redirect users to malicious websites or to prompt the download of fraudulent applications.
Origin of the term “Quishing” and its relationship to phishing
The term quishing comes from the fusion of QR (quick response code) and phishing (fraud through deception).

In a quishing attack, the QR code is used as a means to lure victims to a fraudulent website, imitating the legitimate offers we usually find through these codes. This becomes a threat as dangerous as traditional phishing, but harder to identify, since QR codes are easily scannable and, in principle, trustworthy.
How cybercriminals manipulate QR codes to deceive
Attackers create QR codes that, when scanned, lead users to fraudulent websites.

These pages may mimic the interface of an online store, a bank, or even a payment portal, requesting confidential information such as passwords, bank details, or credit card numbers. What makes quishing so insidious is that users blindly trust the convenience and speed of scanning QR codes without questioning their authenticity.
How does Quishing work?
The way quishing works is simple but extremely effective. Cybercriminals take advantage of people’s impulse to scan QR codes to gain access to their personal and professional information.
The step-by-step process of a Quishing attack

- Creation of the malicious QR code: The attacker generates a QR code that redirects the user to a malicious website, which may appear legitimate at first glance.
- Distribution of the code: The QR code is distributed through different channels: fake emails, social media, printed advertising, or even posters in public places.
- Scanning the QR code: The victim scans the code without hesitation, believing it to be safe.
- Redirection and data theft: Once scanned, the code directs the victim to a website that requests personal information, such as banking credentials, passwords, or credit card details.
Why QR codes are the ideal target for attackers?
QR codes are extremely popular because of their convenience, but they have also become an ideal target for cybercriminals, as users tend to scan them without a second thought.

Moreover, the speed with which a QR code can be scanned and processed makes it a perfect method to steal information in an anonymous and efficient way.
Common Examples of Quishing
Quishing is not limited to a single type of medium. It can appear in different forms and in various contexts, ranging from email to advertising posters in public spaces.
Quishing in emails: how the threat is concealed
A common example of quishing is an email that appears to come from a trusted source, such as an online store or a bank.

The message will include a QR code with an appealing hook (such as an exclusive discount or a limited-time promotion), but when scanning it, the user is taken to a fake website that requests their banking information.
Social media and fake promotions: the perfect bait
Social networks are another fertile ground for quishing. Cybercriminals often post attractive offers or exclusive discounts, promising that by scanning the QR code the user will gain access to the promotion. Instead, the victim ends up revealing their personal information.
QR codes in physical advertising: an easy target for cybercriminals
It is also common to find malicious QR codes on advertising posters or flyers that promise access to discounts, giveaways, or additional information about a product. However, the only thing they actually do is redirect users to a page that, instead of offering useful information, is designed solely to steal sensitive data.

How to Protect Yourself from Quishing
Just like with traditional phishing, the key to protecting yourself from quishing is vigilance and common sense. Here are some recommendations that, as cybersecurity specialists, we always share with our clients at ABD:
Practical tips to avoid becoming a victim of a Quishing attack

- Always verify the source: Before scanning a QR code, make sure it comes from a trustworthy source. If the code is on an unfamiliar poster or in an email that seems suspicious, it's better not to scan it.
- Use secure apps to scan QR codes: Some QR code scanners include features that check the URL before redirecting the user. These applications can alert you if the QR code contains a suspicious URL.
- Keep your devices updated: Regular updates to your operating system and security applications help protect you from vulnerabilities that attackers may exploit.
- Be wary of offers that seem too good to be true: If a QR code leads you to an offer that looks unusually attractive, verify whether it is actually legitimate.
ABD: Cybersecurity Experts

At ABD, we are cybersecurity experts and we are committed to protecting our clients from the most advanced cyber threats.
Based in Seville, Andalusia, we offer customized solutions and consulting services to ensure the security of companies' technological systems.
Free Security Audit by ABD
We offer a free service called ABD – FSS (Free Security Service), through which we help organizations understand the level of risk they are exposed to based on the public information available on the Internet about their company.
With only your organization’s domain, we can analyze the visible vulnerabilities accessible to everyone, which cybercriminals’ bots continuously scan and which form the basis of any massive or targeted attack.
