Friend
Professional
- Messages
- 2,653
- Reaction score
- 850
- Points
- 113
Even experienced users are not immune to the latest scam methods.
Criminal groups in Europe are actively using QR code fraud (quishing) to deceive tourists. Netcraft researchers have reported that two large gangs of attackers are using QR code schemes to pay for parking, spreading them across the UK and other countries.
Scammers place fake QR codes on parking machines, redirecting people to fake sites where they ask for personal data and bank card information. This not only leads to the theft of funds, but also threatens with fines for unpaid parking.
The first signal of the new threat came in August, when the British insurance company RAC warned drivers to be careful and pay for parking only through official apps or in cash. The company estimates that more than 10,000 people have been affected by these schemes in the last two months since the warning was issued.
The prevalence of this kind of fraud is gradually spreading beyond Europe. Thus, the United States and Canada are also beginning to face this problem. The FBI has already issued a warning about the threat of cybercriminals who use QR codes to steal funds from users.
In the UK, scammers started with QR code stickers in central London, and then the scheme spread to cities such as Blackpool, Brighton, Portsmouth and Aberdeen. Scammers place special emphasis on tourists who are not familiar with local parking systems.
One of the criminal syndicates disguises itself as the PayByPhone app. Users scan fake codes, enter car and bank card details, and the site confirms the successful payment. However, in reality, the money is being sent to scammers.
According to researchers, all fraudulent sites have similar features: they are registered through the domain name registrar NameSilo and use the domains ".info", ".click", ".live" and others. To mask fraudulent activity, fake sites also use protection from Cloudflare.
Robert Duncan of Netcraft notes that it is difficult for businesses to protect themselves from such attacks, as mobile devices are less secure than computers. However, using specialized platforms to protect brands can help identify threats at an early stage.
Experts recommend avoiding scanning unknown QR codes and downloading applications only from official stores.
Source
Criminal groups in Europe are actively using QR code fraud (quishing) to deceive tourists. Netcraft researchers have reported that two large gangs of attackers are using QR code schemes to pay for parking, spreading them across the UK and other countries.
Scammers place fake QR codes on parking machines, redirecting people to fake sites where they ask for personal data and bank card information. This not only leads to the theft of funds, but also threatens with fines for unpaid parking.
The first signal of the new threat came in August, when the British insurance company RAC warned drivers to be careful and pay for parking only through official apps or in cash. The company estimates that more than 10,000 people have been affected by these schemes in the last two months since the warning was issued.
The prevalence of this kind of fraud is gradually spreading beyond Europe. Thus, the United States and Canada are also beginning to face this problem. The FBI has already issued a warning about the threat of cybercriminals who use QR codes to steal funds from users.
In the UK, scammers started with QR code stickers in central London, and then the scheme spread to cities such as Blackpool, Brighton, Portsmouth and Aberdeen. Scammers place special emphasis on tourists who are not familiar with local parking systems.
One of the criminal syndicates disguises itself as the PayByPhone app. Users scan fake codes, enter car and bank card details, and the site confirms the successful payment. However, in reality, the money is being sent to scammers.
According to researchers, all fraudulent sites have similar features: they are registered through the domain name registrar NameSilo and use the domains ".info", ".click", ".live" and others. To mask fraudulent activity, fake sites also use protection from Cloudflare.
Robert Duncan of Netcraft notes that it is difficult for businesses to protect themselves from such attacks, as mobile devices are less secure than computers. However, using specialized platforms to protect brands can help identify threats at an early stage.
Experts recommend avoiding scanning unknown QR codes and downloading applications only from official stores.
Source