Hackers use QR codes to hack smartphones

QR codes, which have become increasingly important since the health crisis, are not without risk for users. Explanations.

<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)–sm Mt(0.8em)–sm" type="text" content="Ces petits carrés, souvent noir et blanc, ressemblant de loin à un code-barres, sont omniprésents dans nos vies. Encore plus depuis la crise sanitaire puisque de nombreux restaurants utilisent désormais cette technologie pour présenter leur carte aux clients. Sont-ils pour autant 100% sûrs ? Pas vraiment à en croire une enquête de MobileIron relayée par Forbes conducted among 2,100 Americans and Britons. “data-reactid =” 24 “> These small squares, often black and white, which remotely resemble a barcode, are omnipresent in our lives. All the more since the health crisis that many restaurants are using this technology to present their cards to their customers. But are they 100% sure? Not really believe a survey from MobileIron of Forbes played among 2,100 Americans and Britons.

“We will soon see an onslaught of QR code attacks.”

First observation: “Quick response codes” are popular. Two-thirds of respondents (64%) say this technology makes life easier. However, this almost daily gesture is not without risk. Always ready to plug the loopholes, hackers could turn these 2D barcodes into their new playground.

<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)–sm Mt(0.8em)–sm" type="text" content="READ ALSO >>Watch out for the parcel scam, this old scam that is resurfacing” data-reactid=”27″>READ ALSO >> Watch out for the package scam, this old scam that is reappearing

“We’ll soon see a wave of attacks using QR codes,” said Alex Mosher, vice president of solutions at MobileIron, in an interview with Forbes. How? ‘Or’ What? ‘Or what? By embedding a malicious URL in a QR code. Using malware and exploiting user ignorance, hackers can filter mobile device data based on the scanned QR code.

“A hacker could embed a malicious URL into a QR code that redirects the user to a phishing site and encourages them to reveal their credentials. It would then be enough for him to use this information to infiltrate the company, ”adds Alex Mosher. After all, 71% of respondents to this study didn’t know how to tell the difference between a legitimate QR code and a malicious QR code.

<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)–sm Mt(0.8em)–sm" type="text" content="Soyez donc particulièrement vigilants. Aux Pays-Bas, des escrocs ont profité de this technology to rob many victims at the beginning of the year. “data-reactid =” 31 “> So be very careful. In the Netherlands, the crooks took advantage This technology is said to deprive many victims at the beginning of the year.

<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)–sm Mt(0.8em)–sm" type="text" content="You may also be interested in this content:” data-reactid=”32″>You may also be interested in this content:

“Evil explorer. Reader. Internet addict. Travel practitioner. Beer Evangelist. Learned Bacon. ”

Leave a Comment