Threat Update: Malicious QR Codes Pose Risk to iPhone, Android Devices

We’ve all seen those interesting little white barcode boxes with lots of squiggles and lines that urge us to scan them with our cell phones. Called QR codes, these shortcut codes to mobile websites and applications are an elegantly simple way to cram loads of information into users’ devices with total ease. But the same […]

Jan 26, 2012
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

We’ve all seen those interesting little white barcode boxes
with lots of squiggles and lines that urge us to scan them with our cell phones.
Called QR codes, these shortcut codes to mobile websites and applications are
an elegantly simple way to cram loads of information into users’ devices with
total ease. But the same convenience and seamlessness that makes this
technology a great way to transmit information also makes it an ideal vector
for hackers, pranksters and fraudsters to use against us, security experts
warn.

"The idea behind QR code, is pretty simple.  It’s
a small matrix barcode that consists of black modules arranged in a square
pattern on a white background and can store alphanumeric characters. These
characters can hold text or URLs," said Tomer Teller, security evangelist
at Check Point Software Technologies. "Without scanning the barcode one
cannot figure out what kind of information is stored in the matrix. This is the
perfect attack vector for attackers who want to conceal their
attacks."

Just like URL shortening services have made it easy to
spread malware through social media and the web QR code is doing the same for
hackers who love it for its obscurity, security pros say.

"It is very easy to make a QR code and redirect it
someplace so that a person thinks they’re going to go to a Coca-Cola website
when actually you switch out that code and you send them to a malicious website
where it automatically downloads malicious code to your mobile device," said
Damon Petraglia, director of forensic and information security services for
Chartstone, who said the biggest risk is that people cannot deny their own
curiosity.

Attackers can fool users into scanning bad QR codes several
ways. They might put a sticker over an advertisement’s legitimate QR code. They
might just print up some phony ads or flyers and distribute them in a public
place. Or they might send them in a traditional spam attack.

"The idea is to redirect you to somewhere malicious,"
said Teller. "QR is working well so far because it’s cool, easy and
convenient. Also, people tend to click through menus before verifying– (if
asked) ‘Are you sure you want to go to http://www.evil.com/ ‘, users will
usually click yes!"

Once a victim has scanned a malicious QR code, the attackers
can come at them in a number of different ways. They can use the code to direct
the victim to phishing sites just like with emailed spam. Or they can be used
to install malware on the phone.

"On the iPhone attackers are re-purposing the
jail-break exploits to redirect users to a website that will jailbreak their
device and install additional malware," Teller said. "On the Android,
the chances of getting infected are often much higher, since application are allowed
to do actions such as sending SMS, blocking SMS and making calls. Instead of
jail breaking the Android, criminals are redirecting users to download
malicious applications."

For example, on Android QR codes are being used to install
the Trojan "jimm.apk" on users’ phones, according to Paul Henry, security
and forensic analyst at Lumension.

"Once installed, this malware automatically sends SMS
messages to a "paid" number at a cost of $6 per SMS message to the
unsuspecting infected user," he said.

According to Joe Levy, CTO of Solera Networks, IT managers
and service providers need to be vigilant about these types of attacks.

"Most of the QR code applications today provide a layer
of mediation, informing the user of the target URL or device action, and
requiring confirmation before any activity is performed. Unfortunately, there
is no standard for this, and there are a number of applications that browse
directly to URLs immediately following a successful scan, or that do not set
‘ask before opening’ as a default," he said. "Since the increasing
use of QR codes is likely an inevitability, IT and security staffs should
proactively pre-screen available QR applications, and offer the best-behaved to
their users as ‘approved.’"

 

Recommended for you...

Trend Micro and Google Cloud Double Down on AI Security

The expanded alliance emphasizes AI-driven defenses, sovereign cloud capabilities, and new anti-scam protections for businesses worldwide.

Allison Francis
Jul 30, 2025
Arctera Updates Platform to Reduce AI Compliance Risks

Arctera updates Insight to help organizations capture, chronicle & contain AI data, easing compliance and unlocking insights from LLM interactions.

TA Wordpress
Jul 30, 2025
Channel Vet Frank Rauch Joining Morphisec in Advisory Role

Channel vet Frank Rauch joins Morphisec’s advisory board to boost MSSP strategy and partner growth with a prevention-first cybersecurity focus.

Jordan Smith
Jul 29, 2025
Azul Debuts Managed Services Program for Java-Focused Partners

Azul empowers MSPs with sublicensable Java insights, enabling code cleanup, vulnerability detection, and license compliance via Intelligence Cloud.

Jordan Smith
Jul 29, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.