{"id":28845,"date":"2024-11-07T10:50:15","date_gmt":"2024-11-07T09:50:15","guid":{"rendered":"https:\/\/www.abd.es\/?p=28845"},"modified":"2024-11-07T10:57:50","modified_gmt":"2024-11-07T09:57:50","slug":"quishing","status":"publish","type":"post","link":"https:\/\/www.abd.es\/en\/2024\/11\/quishing\/","title":{"rendered":"Quishing: The New Cyber Threat Affecting Users and Businesses"},"content":{"rendered":"<p class=\"translation-block\"><strong>Quishing<\/strong> is an emerging threat that we all need to be aware of in today\u2019s digital world.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-28850 size-full\" title=\"El quishing es una amenaza emergente\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.webp\" alt=\"El quishing es una amenaza emergente\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>In our daily lives, we rely on technology for everything, from everyday tasks to financial transactions.<\/p>\n<p class=\"translation-block\">However, <strong>cyberthreats<\/strong> continue to evolve, and although many are already familiar with <strong>phishing<\/strong> and <strong>ransomware<\/strong>, <strong>quishing<\/strong> is a new tactic that is rapidly gaining ground and often goes unnoticed.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-28848 size-full\" title=\"las ciberamenazas no dejan de evolucionar\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-2.webp\" alt=\"las ciberamenazas no dejan de evolucionar\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-2.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-2-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-2-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-2-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Imagine this: you're at a caf\u00e9 in the center of Seville, enjoying a quiet afternoon, and you decide to scan a QR code to view the menu. Without giving it a second thought, you scan the code and, in the blink of an eye, your personal information could end up in the hands of cybercriminals.<\/p>\n<p class=\"translation-block\">This is the danger of <strong>quishing<\/strong>, and it is crucial that we stay informed and prepared to protect ourselves.<\/p>\n<h3><strong>QR codes are no longer as safe as we once thought.<\/strong><\/h3>\n<p class=\"translation-block\">As a <a href=\"https:\/\/www.abd.es\/en\/auditoria-seguridad-informatica\/\" target=\"_self\">cybersecurity specialist<\/a> at <strong>ABD Consultor\u00eda y Soluciones Inform\u00e1ticas<\/strong>, I have seen how cybercriminals constantly adapt to new technologies to bypass even the most advanced security measures.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-28849 size-full\" title=\"El quishing es un claro ejemplo de c\u00f3mo las t\u00e1cticas tradicionales de fraude se est\u00e1n fusionando\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-3.webp\" alt=\"El quishing es un claro ejemplo de c\u00f3mo las t\u00e1cticas tradicionales de fraude se est\u00e1n fusionando\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-3.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-3-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-3-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-3-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"translation-block\">Quishing is a clear example of how <a href=\"https:\/\/www.abd.es\/en\/2023\/11\/ciberhigiene-previene-el-99-de-los-ciberataques-2\/\" target=\"_blank\" rel=\"noopener\">traditional fraud tactics are merging<\/a> with new communication tools. If you\u2019ve ever scanned a QR code without thinking twice, this article is for you.<\/p>\n<h2><strong>What is Quishing?<\/strong><\/h2>\n<p class=\"translation-block\"><strong>Quishing<\/strong> is an emerging threat that combines traditional phishing with the growing popularity of QR codes. This attack takes a different approach from classic phishing, where cybercriminals attempt to deceive victims through fake emails or messages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28851 size-full\" title=\"What is Quishing?\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-5.webp\" alt=\"\u00bfQu\u00e9 es el Quishing?\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-5.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-5-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-5-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-5-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"translation-block\">Quishing, on the other hand, takes advantage of the growing use of <strong>QR codes<\/strong> to redirect users to malicious websites or to prompt the download of fraudulent applications.<\/p>\n<h3><strong>Origin of the term \u201cQuishing\u201d and its relationship to phishing<\/strong><\/h3>\n<p class=\"translation-block\">The term <a href=\"https:\/\/www.larazon.es\/tecnologia\/ojo-que-escaneas-asi-estafa-quishing_2024061766707f006a0d130001138d6a.html\" target=\"_blank\" rel=\"noopener\"><em>quishing<\/em> comes from the fusion of <strong>QR<\/strong><\/a> (quick response code) and <strong>phishing<\/strong> (fraud through deception).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28847 size-full\" title=\"Origen del t\u00e9rmino &quot;Quishing&quot; y su relaci\u00f3n con el phishing\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-1-1.webp\" alt=\"Origen del t\u00e9rmino &quot;Quishing&quot; y su relaci\u00f3n con el phishing\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-1-1.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-1-1-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-1-1-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-1-1-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>In a quishing attack, the QR code is used as a means to lure victims to a fraudulent website, imitating the legitimate offers we usually find through these codes. This becomes a threat as dangerous as traditional phishing, but harder to identify, since QR codes are easily scannable and, in principle, trustworthy.<\/p>\n<h3><strong>How cybercriminals manipulate QR codes to deceive<\/strong><\/h3>\n<p class=\"translation-block\">Attackers create QR codes that, when scanned, lead users to <strong>fraudulent websites<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28855 size-full\" title=\"How cybercriminals manipulate QR codes to deceive\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-9.webp\" alt=\"C\u00f3mo los ciberdelincuentes manipulan los c\u00f3digos QR para enga\u00f1ar\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-9.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-9-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-9-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-9-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"translation-block\">These pages may mimic the interface of an online store, a bank, or even a payment portal, requesting confidential information such as <strong>passwords<\/strong>, <strong>bank details<\/strong>, or <strong>credit card numbers<\/strong>. What makes quishing so insidious is that users <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftdefenderforoffice365blog\/protect-your-organizations-against-qr-code-phishing-with-defender-for-office-365\/4007041\" target=\"_blank\" rel=\"noopener\">blindly trust the convenience and speed of scanning QR codes<\/a> without questioning their authenticity.<\/p>\n<h2><strong>How does Quishing work?<\/strong><\/h2>\n<p>The way quishing works is simple but extremely effective. Cybercriminals take advantage of people\u2019s impulse to scan QR codes to gain access to their personal and professional information.<\/p>\n<h3><strong>The step-by-step process of a Quishing attack<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28852 size-full\" title=\"How does Quishing work?\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-6.webp\" alt=\"\u00bfC\u00f3mo Funciona el Quishing?\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-6.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-6-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-6-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-6-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<ol>\n<li class=\"translation-block\"><strong>Creation of the malicious QR code<\/strong>: The attacker generates a QR code that redirects the user to a malicious website, which may appear legitimate at first glance.<\/li>\n<li class=\"translation-block\"><strong>Distribution of the code<\/strong>: The QR code is distributed through different channels: <strong>fake emails<\/strong>, <strong>social media<\/strong>, <strong>printed advertising<\/strong>, or even <strong>posters in public places<\/strong>.<\/li>\n<li class=\"translation-block\"><strong>Scanning the QR code<\/strong>: The victim scans the code without hesitation, believing it to be safe.<\/li>\n<li class=\"translation-block\"><strong>Redirection and data theft<\/strong>: Once scanned, the code directs the victim to a website that requests personal information, such as banking credentials, passwords, or credit card details.<\/li>\n<\/ol>\n<h2><strong>Why QR codes are the ideal target for attackers?<\/strong><\/h2>\n<p>QR codes are extremely popular because of their convenience, but they have also become an ideal target for cybercriminals, as users tend to scan them without a second thought.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28853 size-full\" title=\"Why QR codes are the ideal target for attackers?\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-7.webp\" alt=\"\u00bfPor qu\u00e9 los c\u00f3digos QR son el objetivo ideal para los atacantes?\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-7.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-7-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-7-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-7-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"translation-block\">Moreover, the speed with which a QR code can be scanned and processed makes it a perfect method to steal information in an <strong>anonymous<\/strong> and <strong>efficient<\/strong> way.<\/p>\n<h3><strong><strong>Common Examples of Quishing<\/strong><\/strong><\/h3>\n<p class=\"translation-block\">Quishing is not limited to a single type of medium. It can appear in <strong>different forms<\/strong> and in <strong>various contexts<\/strong>, ranging from email to advertising posters in public spaces.<\/p>\n<p><strong><strong>Quishing in emails: how the threat is concealed<\/strong><\/strong><\/p>\n<p>A common example of quishing is an email that appears to come from a trusted source, such as an online store or a bank.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28856 size-full\" title=\"&lt;strong&gt;Common Examples of Quishing&lt;\/strong&gt;\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-10.webp\" alt=\"Ejemplos Comunes de Quishing\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-10.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-10-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-10-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-10-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The message will include a QR code with an appealing hook (such as an exclusive discount or a limited-time promotion), but when scanning it, the user is taken to a fake website that requests their banking information.<\/p>\n<h3><strong>Social media and fake promotions: the perfect bait<\/strong><\/h3>\n<p>Social networks are another fertile ground for quishing. Cybercriminals often post attractive offers or exclusive discounts, promising that by scanning the QR code the user will gain access to the promotion. Instead, the victim ends up revealing their personal information.<\/p>\n<h3><strong>QR codes in physical advertising: an easy target for cybercriminals<\/strong><\/h3>\n<p class=\"translation-block\">It is also common to find malicious QR codes on <strong>advertising posters<\/strong> or <strong>flyers<\/strong> that promise access to discounts, giveaways, or additional information about a product. However, the only thing they actually do is redirect users to a page that, instead of offering useful information, is designed solely to steal sensitive data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28857 size-full\" title=\"QR codes in physical advertising: an easy target for cybercriminals\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer.webp\" alt=\"C\u00f3digos QR en publicidad f\u00edsica: un blanco f\u00e1cil para los ciberdelincuentes\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong><strong>How to Protect Yourself from Quishing<\/strong><\/strong><\/p>\n<p class=\"translation-block\">Just like with traditional phishing, the key to <strong>protecting yourself from quishing<\/strong> is <strong>vigilance<\/strong> and <strong>common sense<\/strong>. Here are some recommendations that, as cybersecurity specialists, we always share with our clients at <a href=\"https:\/\/www.abd.es\/en\/\" target=\"_blank\" rel=\"noopener\"><strong>ABD<\/strong><\/a>:<\/p>\n<h2><strong>Practical tips to avoid becoming a victim of a Quishing attack<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28854 size-full\" title=\"Practical tips to avoid becoming a victim of a Quishing attack\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-8.webp\" alt=\"Consejos pr\u00e1cticos para evitar ser v\u00edctima de un ataque de Quishing\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-8.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-8-300x300.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-8-150x150.webp 150w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-8-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<ul>\n<li class=\"translation-block\"><strong>Always verify the source<\/strong>: Before scanning a QR code, make sure it comes from a trustworthy source. If the code is on an unfamiliar poster or in an email that seems suspicious, it's better not to scan it.<\/li>\n<li class=\"translation-block\"><strong>Use secure apps to scan QR codes<\/strong>: Some QR code scanners include features that check the URL before redirecting the user. These applications can alert you if the QR code contains a suspicious URL.<\/li>\n<li class=\"translation-block\"><strong>Keep your devices updated<\/strong>: Regular updates to your operating system and security applications help protect you from vulnerabilities that attackers may exploit.<\/li>\n<li class=\"translation-block\"><strong>Be wary of offers that seem too good to be true<\/strong>: If a QR code leads you to an offer that looks unusually attractive, verify whether it is actually legitimate.<\/li>\n<\/ul>\n<h2><strong>ABD: Cybersecurity Experts<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21271 size-large\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47-1024x576.webp\" alt=\"ABD Consultor\u00eda ERP \/ CRM\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47-1024x576.webp 1024w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47-300x169.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47-768x432.webp 768w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47-1536x864.webp 1536w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47-640x360.webp 640w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/47.webp 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p class=\"translation-block\">At ABD, <a href=\"https:\/\/www.abd.es\/en\/auditoria-seguridad-informatica\/\" target=\"_blank\" rel=\"noopener\">we are cybersecurity experts<\/a> and we are committed to protecting our clients from the most advanced cyber threats.<\/p>\n<p>Based in Seville, Andalusia, we offer customized solutions and consulting services to ensure the security of companies' technological systems.<\/p>\n<h3><strong>Free Security Audit by ABD<\/strong><\/h3>\n<p><a href=\"https:\/\/www.abd.es\/en\/auditoria-seguridad-informatica\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28858 size-full\" title=\"Free Security Audit by ABD\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Empresas-42.webp\" alt=\"Auditor\u00eda de Seguridad Gratuita de ABD\" width=\"1000\" height=\"563\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Empresas-42.webp 1000w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Empresas-42-300x169.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Empresas-42-768x432.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p class=\"translation-block\">We offer a free service called <a href=\"https:\/\/www.abd.es\/en\/auditoria-seguridad-informatica\/\" target=\"_self\"><strong>ABD \u2013 FSS (Free Security Service)<\/strong><\/a>, through which we help organizations understand the level of risk they are exposed to based on the public information available on the Internet about their company.<\/p>\n<p>With only your organization\u2019s domain, we can analyze the visible vulnerabilities accessible to everyone, which cybercriminals\u2019 bots continuously scan and which form the basis of any massive or targeted attack.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>El quishing es una amenaza emergente que todos debemos conocer en el mundo digital de hoy. En nuestra vida diaria, dependemos de la tecnolog\u00eda para todo, desde tareas cotidianas hasta transacciones financieras. Sin embargo, las ciberamenazas no dejan de evolucionar, y aunque muchos ya est\u00e1n familiarizados con el phishing y el ransomware, el quishing es [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":28861,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[79],"tags":[1172,3505,3504,3503,1327,120,861,146,1679,3458,3502,870,1595],"class_list":["post-28845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos","tag-anti-phishing","tag-auditoria-de-seguridad","tag-auditoria-de-seguridad-gratuita","tag-ciberdelincuentes","tag-ciberseguridad","tag-microsoft","tag-microsoft-365","tag-office-365","tag-phishing","tag-qr","tag-quishing","tag-ransomware","tag-sevilla"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quishing: La Nueva Amenaza Cibern\u00e9tica con QR<\/title>\n<meta name=\"description\" content=\"Quishing , una nueva amenaza cibern\u00e9tica que utiliza c\u00f3digos QR maliciosos, est\u00e1 poniendo en riesgo a usuarios y empresas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abd.es\/en\/2024\/11\/quishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quishing: La Nueva Amenaza Cibern\u00e9tica con QR\" \/>\n<meta property=\"og:description\" content=\"Quishing , una nueva amenaza cibern\u00e9tica que utiliza c\u00f3digos QR maliciosos, est\u00e1 poniendo en riesgo a usuarios y empresas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abd.es\/en\/2024\/11\/quishing\/\" \/>\n<meta property=\"og:site_name\" content=\"ABD Consultora Inform\u00e1tica\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-07T09:50:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T09:57:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Javier Soler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Javier Soler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/\"},\"author\":{\"name\":\"Javier Soler\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/person\\\/7fb3febbcfe474fb03aa7b9f11143ebe\"},\"headline\":\"Quishing: La Nueva Amenaza Cibern\u00e9tica que Afecta a Usuarios y Empresas\",\"datePublished\":\"2024-11-07T09:50:15+00:00\",\"dateModified\":\"2024-11-07T09:57:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/\"},\"wordCount\":1350,\"publisher\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Designer-4.jpeg\",\"keywords\":[\"Anti-Phishing\",\"Auditor\u00eda de Seguridad\",\"Auditor\u00eda de Seguridad Gratuita\",\"ciberdelincuentes\",\"Ciberseguridad\",\"Microsoft\",\"Microsoft 365\",\"Office 365\",\"phishing\",\"QR\",\"Quishing\",\"RansomWare\",\"sevilla\"],\"articleSection\":[\"Articulos\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/\",\"url\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/\",\"name\":\"Quishing: La Nueva Amenaza Cibern\u00e9tica con QR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Designer-4.jpeg\",\"datePublished\":\"2024-11-07T09:50:15+00:00\",\"dateModified\":\"2024-11-07T09:57:50+00:00\",\"description\":\"Quishing , una nueva amenaza cibern\u00e9tica que utiliza c\u00f3digos QR maliciosos, est\u00e1 poniendo en riesgo a usuarios y empresas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Designer-4.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Designer-4.jpeg\",\"width\":1024,\"height\":1024,\"caption\":\"Quishing: La Nueva Amenaza Cibern\u00e9tica\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/11\\\/quishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.abd.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quishing: La Nueva Amenaza Cibern\u00e9tica que Afecta a Usuarios y Empresas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#website\",\"url\":\"https:\\\/\\\/www.abd.es\\\/\",\"name\":\"ABD Consultora Inform\u00e1tica\",\"description\":\"Soluciones Empresariales | Microsoft Gold Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.abd.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\",\"name\":\"ABD Consultora Inform\u00e1tica\",\"url\":\"https:\\\/\\\/www.abd.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/cropped-consultoria-informatica-11.png\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/cropped-consultoria-informatica-11.png\",\"width\":64,\"height\":64,\"caption\":\"ABD Consultora Inform\u00e1tica\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abd-consultor-a-y-soluciones-inform-ticas\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/person\\\/7fb3febbcfe474fb03aa7b9f11143ebe\",\"name\":\"Javier Soler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/f537f28e3fe6247a9d0ce0ada72d6823.jpg?ver=1777407093\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/f537f28e3fe6247a9d0ce0ada72d6823.jpg?ver=1777407093\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/f537f28e3fe6247a9d0ce0ada72d6823.jpg?ver=1777407093\",\"caption\":\"Javier Soler\"},\"description\":\"Soy especialista en sistemas t\u00e9cnicos para ABD Consultor\u00eda y Soluciones Inform\u00e1ticas. Me especializo en el dise\u00f1o y la implementaci\u00f3n de soluciones avanzadas dentro del ecosistema Microsoft. Como Microsoft Certified Cybersecurity Architect Expert, Security Operations Analyst Associate y Azure Solutions Architect Expert, estoy comprometido a asegurar la integridad y eficiencia de los sistemas tecnol\u00f3gicos de nuestros clientes. Con una s\u00f3lida formaci\u00f3n en Azure, Microsoft 365 y soluciones de seguridad avanzada, mi objetivo es proporcionar soluciones tecnol\u00f3gicas innovadoras que impulsen el \u00e9xito empresarial.\",\"url\":\"https:\\\/\\\/www.abd.es\\\/en\\\/author\\\/javier-soler\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quishing: La Nueva Amenaza Cibern\u00e9tica con QR","description":"Quishing , una nueva amenaza cibern\u00e9tica que utiliza c\u00f3digos QR maliciosos, est\u00e1 poniendo en riesgo a usuarios y empresas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abd.es\/en\/2024\/11\/quishing\/","og_locale":"en_GB","og_type":"article","og_title":"Quishing: La Nueva Amenaza Cibern\u00e9tica con QR","og_description":"Quishing , una nueva amenaza cibern\u00e9tica que utiliza c\u00f3digos QR maliciosos, est\u00e1 poniendo en riesgo a usuarios y empresas.","og_url":"https:\/\/www.abd.es\/en\/2024\/11\/quishing\/","og_site_name":"ABD Consultora Inform\u00e1tica","article_published_time":"2024-11-07T09:50:15+00:00","article_modified_time":"2024-11-07T09:57:50+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.jpeg","type":"image\/jpeg"}],"author":"Javier Soler","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Javier Soler","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#article","isPartOf":{"@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/"},"author":{"name":"Javier Soler","@id":"https:\/\/www.abd.es\/#\/schema\/person\/7fb3febbcfe474fb03aa7b9f11143ebe"},"headline":"Quishing: La Nueva Amenaza Cibern\u00e9tica que Afecta a Usuarios y Empresas","datePublished":"2024-11-07T09:50:15+00:00","dateModified":"2024-11-07T09:57:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/"},"wordCount":1350,"publisher":{"@id":"https:\/\/www.abd.es\/#organization"},"image":{"@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.jpeg","keywords":["Anti-Phishing","Auditor\u00eda de Seguridad","Auditor\u00eda de Seguridad Gratuita","ciberdelincuentes","Ciberseguridad","Microsoft","Microsoft 365","Office 365","phishing","QR","Quishing","RansomWare","sevilla"],"articleSection":["Articulos"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/","url":"https:\/\/www.abd.es\/2024\/11\/quishing\/","name":"Quishing: La Nueva Amenaza Cibern\u00e9tica con QR","isPartOf":{"@id":"https:\/\/www.abd.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#primaryimage"},"image":{"@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.jpeg","datePublished":"2024-11-07T09:50:15+00:00","dateModified":"2024-11-07T09:57:50+00:00","description":"Quishing , una nueva amenaza cibern\u00e9tica que utiliza c\u00f3digos QR maliciosos, est\u00e1 poniendo en riesgo a usuarios y empresas.","breadcrumb":{"@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abd.es\/2024\/11\/quishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#primaryimage","url":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.jpeg","contentUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/11\/Designer-4.jpeg","width":1024,"height":1024,"caption":"Quishing: La Nueva Amenaza Cibern\u00e9tica"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abd.es\/2024\/11\/quishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.abd.es\/"},{"@type":"ListItem","position":2,"name":"Quishing: La Nueva Amenaza Cibern\u00e9tica que Afecta a Usuarios y Empresas"}]},{"@type":"WebSite","@id":"https:\/\/www.abd.es\/#website","url":"https:\/\/www.abd.es\/","name":"ABD IT Consulting","description":"Business Solutions | Microsoft Gold Partner","publisher":{"@id":"https:\/\/www.abd.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abd.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.abd.es\/#organization","name":"ABD IT Consulting","url":"https:\/\/www.abd.es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.abd.es\/wp-content\/uploads\/2023\/09\/cropped-consultoria-informatica-11.png","contentUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2023\/09\/cropped-consultoria-informatica-11.png","width":64,"height":64,"caption":"ABD Consultora Inform\u00e1tica"},"image":{"@id":"https:\/\/www.abd.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/abd-consultor-a-y-soluciones-inform-ticas\/"]},{"@type":"Person","@id":"https:\/\/www.abd.es\/#\/schema\/person\/7fb3febbcfe474fb03aa7b9f11143ebe","name":"Javier Soler","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/f537f28e3fe6247a9d0ce0ada72d6823.jpg?ver=1777407093","url":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/f537f28e3fe6247a9d0ce0ada72d6823.jpg?ver=1777407093","contentUrl":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/f537f28e3fe6247a9d0ce0ada72d6823.jpg?ver=1777407093","caption":"Javier Soler"},"description":"I am a technical systems specialist at ABD Consulting and IT Solutions. I focus on designing and implementing advanced solutions within the Microsoft ecosystem. As a Microsoft Certified Cybersecurity Architect Expert, Security Operations Analyst Associate, and Azure Solutions Architect Expert, I am committed to ensuring the integrity and efficiency of our clients\u2019 technological systems. With a strong background in Azure, Microsoft 365, and advanced security solutions, my goal is to deliver innovative technological solutions that drive business success.","url":"https:\/\/www.abd.es\/en\/author\/javier-soler\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/28845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/comments?post=28845"}],"version-history":[{"count":5,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/28845\/revisions"}],"predecessor-version":[{"id":28864,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/28845\/revisions\/28864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/media\/28861"}],"wp:attachment":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/media?parent=28845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/categories?post=28845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/tags?post=28845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}