logo
Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

Biz Bahrain16-07-2025
In today's digital world, QR codes are placed on almost everything – from yogurt containers and restaurant menus to museum exhibits, and even utility bills and parking lots. People use them to open websites, download apps, collect loyalty program points, make payments and transfer money, and even for charity donations. The accessible and practical technology is convenient for many, including cybercriminals, who have already rolled out a variety of QR-based schemes. Kaspersky experts have identified the top security risks when scanning QR codes: • Phishing and redirection to malicious sites: QR codes can direct users to fraudulent websites designed to steal personal or financial information, such as passwords and credit card numbers. Attackers can impersonate legitimate sites, such as banks or streaming services, and trick users into entering their credentials. • Malware download: Some QR codes can trigger the download of malicious applications that compromise the security of the user's device, especially if it is not protected against unauthorized installation. • Payment fraud: During special events or sales periods like holiday sales, a fake QR code can redirect users to make payments to fraudulent accounts. • Unsafe automatic connections: A QR code can also automatically connect the user to Wi-Fi networks controlled by cyber attackers, allowing them to intercept their communications. 'QR codes are a fertile ground for potential manipulation, especially as they appear in various everyday contexts such as receipts, flyers, and signage. Attackers have nearly endless possibilities to exploit them. As these codes have already become an integral part of our daily lives, it is essential for users to know how to use them safely and responsibly,' says Seifallah Jedidi, Head of Consumer Channel for META at Kaspersky. In order to not fall for a scam when scanning a QR code, Kaspersky experts recommend: • Verify the source: Scan QR codes only from trusted and known sources. Avoid scanning codes in public places that may have been tampered with. • Check the URL: If you really need to scan a publicly available code, verify that the web address it directed you to is legitimate before taking any action on this website. • Don't share personal information: Avoid entering sensitive information if you're not completely sure of the origin of the QR code.
• Protect your digital life: Install a cybersecurity solution with anti-phishing and anti-fraud protection, such as Kaspersky Premium, on all your devices; it will alert you to any danger timely.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Kaspersky discovered cyberattacks that sourced information from GitHub, Quora, and social networks to target organizations
Kaspersky discovered cyberattacks that sourced information from GitHub, Quora, and social networks to target organizations

Biz Bahrain

timea day ago

  • Biz Bahrain

Kaspersky discovered cyberattacks that sourced information from GitHub, Quora, and social networks to target organizations

Kaspersky detected a complex attack sequence that involved retrieving information from legitimate services such as GitHub, Microsoft Learn Challenge, Quora, and social networks. The attackers did this to avoid detection and run an execution chain to launch Cobalt Strike Beacon, a tool to remotely control computers, execute commands, steal data, and maintain persistent access within a network. The attacks were detected in the second half of 2024 in organizations across China, Japan, Malaysia, Peru and Russia, and persisted into 2025. The majority of victims were large to medium-sized businesses. To infiltrate victims' devices, the attackers sent spear phishing emails which were disguised as legitimate communications from major state-owned companies, particularly within the oil and gas sector. The text was phrased to look like there was interest in products and services of the victim organization to convince the recipient to open the malicious attachment. The attachment was an archive with what looked like PDF files containing requirements for the requested products and services – but in fact some of these PDFs were executable EXE and DLL files containing malware. The attackers leveraged DLL highjacking techniques and exploited the legitimate Crash reporting Send Utility which is originally designed to help developers get detailed, real-time crash reports for their applications. To function, the malware also retrieved and downloaded a code that was stored in public profiles on popular legitimate platforms to avoid detection. Kaspersky found this code encrypted inside profiles on GitHub, and links to it (also encrypted) – on other GitHub profiles, Microsoft Learn Challenge, Q&A websites, and even Russian social media platforms. All of these profiles and pages were created specifically for this attack. After the malicious code was executed on victims' machines, Cobalt Strike Beacon was launched, and the victims' systems were compromised. 'While we didn't find any evidence of the attackers using real people's social media profiles, as all the accounts were created specifically for this attack, there's nothing stopping the threat actor from abusing various mechanisms these platforms provide. For instance, malicious content strings could be posted in comments on legitimate users' posts. Threat actors are using increasingly complex methods to conceal long-known tools, and it's important to stay up to date with the latest threat intelligence to be protected from such attacks,' comments Maxim Starodubov, Malware Analyst Team Lead at Kaspersky. The method used to retrieve the download address for the malicious code is similar to what was observed in the EastWind campaign linked to Chinese-speaking actors. Kaspersky recommends that organizations follow these security guidelines to stay safe: • Track the status of digital infrastructure and continuously monitor the perimeter. • Use proven security solutions to detect and block malware embedded within bulk email. • Train staff to increase cybersecurity awareness. • Secure corporate devices with a comprehensive system, such as Kaspersky Next, that detects and blocks attacks in the early stages.

Polyworking generation: How Gen Z's multi-job hustle brings more cybersecurity risks
Polyworking generation: How Gen Z's multi-job hustle brings more cybersecurity risks

Biz Bahrain

time2 days ago

  • Biz Bahrain

Polyworking generation: How Gen Z's multi-job hustle brings more cybersecurity risks

The new Gen Z trend of 'polyworking' — juggling multiple jobs at once — is creating new cybersecurity challenges, as each additional role increases the risk of attacks on both individuals and corporate networks. From H2 2024 to H1 2025, Kaspersky detected over 6 million attacks disguised as work tools, along with scams posing as job offers on Indeed, Glassdoor, and similar platforms. To help Gen Z navigate in the digital environment, Kaspersky has launched 'Case 404' — an interactive cyber-detective game that helps Gen Z recognize hidden online dangers and learn how to protect their digital lives. For Gen Z, working one job is no longer the norm, it's an exception. While the concept of juggling multiple jobs isn't entirely new, this generation (born 1997–2012) is accelerating the trend of polyworking. The term refers to juggling multiple income streams simultaneously, combining freelance gigs, side hustles, passion projects, and part-time or full-time employment. According to public research, almost a half (48%) of Gen Z members already have a side job, which is the highest rate among all generations. But while polyworking brings autonomy, flexibility, and financial resilience, it also opens the door to new cybersecurity risks — many of which Gen Z may be unaware of. Too many tools, too little control Managing multiple job roles also means navigating an ever-expanding digital environment. Each additional role brings with it new inboxes, project management tools, communication platforms, and external contacts. For polyworking Gen Z users, this can result in dozens of apps and accounts operating simultaneously — from Microsoft Teams and Outlook, to Slack, Zoom, and Notion. While these platforms are designed to streamline collaboration, they also dramatically widen the attack surface. Cybercriminals may take advantage of this complexity, launching phishing emails through compromised business accounts, embedding malware in fake calendar invites, or sending malicious links via chat apps disguised as legitimate coworker messages. The more tools in use, the harder it becomes to verify every interaction, creating the perfect conditions for social engineering and accidental breaches. Between H2 2024 and H1 2025, Kaspersky experts detected 6,146,462 attacks disguised as platforms or content related to 20 popular work tools. The top targets were Zoom (3,849,489), Microsoft Excel (835,179), and Outlook (731,025), followed by OneDrive (352,080) and Microsoft Teams (151,845). In one of the many scams uncovered by Kaspersky researchers, users were tricked into downloading a supposed Zoom update from a phishing page, which in reality was malware in disguise. Example of a phishing page offering to download 'the latest version of Zoom' Job platforms With the rise of so many new income platforms, alongside more traditional job search sites, there also comes an increased cybersecurity risk. As Gen Z explores opportunities across Fiverr, Upwork, Behance, LinkedIn, they are increasingly targeted by phishing schemes disguised as legitimate job offers. From July 2024 to June 2025, Kaspersky experts detected over 650,000 attempts to visit phishing pages disguised as LinkedIn alone. Cybercriminals can exploit the urgency and informality of freelance culture, sending fake recruitment emails, contract attachments, or messages with malicious links that promise 'quick gigs' or 'exclusive offers'. The sheer volume of communication Gen Z receives across inboxes, messengers, and gig platforms widens the attack surface, making it easier for threat actors to slip through unnoticed. What might look like a promising freelance opportunity, may in fact be a trap designed to steal login credentials, deploy malware, or compromise payment information. To access the files with a job offer, a user is asked to log in to LinkedIn – not on the official version, but on a phishing page Poor password hygiene Managing access to a growing number of platforms — ranging from project tools and gig marketplaces to payment systems and internal workspaces — often leads to shortcuts. In the rush to stay productive across multiple jobs, Gen Z workers may frequently reuse passwords or rely on simple, easy-to-remember combinations. While convenient, this practice dramatically increases the likelihood of account compromise. A single weak, or repeated password used across multiple roles can serve as a gateway for cybercriminals, allowing them to move laterally between accounts, steal sensitive information, or even launch further attacks using the victim's identity. Personal devices and shadow IT The situation is further complicated by device usage. Many Gen Z polyworkers operate across multiple gigs using the same personal laptop or smartphone — without segmentation between their work and personal environments. This overlap makes it easy for sensitive client files or corporate credentials to be saved on unsecured devices or public cloud storage solutions like Google Drive or Dropbox. In some cases, polyworkers also install unauthorized software or browser extensions to streamline their multitasking — a practice known as shadow IT. While helpful in the short term, these unauthorized apps may have vulnerabilities or operate with unclear data-sharing policies, increasing the attack surface across all jobs. The danger here isn't limited to individual freelancers. One compromised account, such as a hacked Fiverr login or an email phishing incident tied to a side project, can cascade into much larger breaches if the same credentials are reused for corporate systems. For organizations hiring remote contractors or allowing BYOD (bring your own device) practices, this raises serious questions about endpoint security and credential management. 'When your calendar is packed with tasks from three different jobs and you have notifications coming in from five separate apps, and you're also switching between client chats, invoices, and creative work on the same device — it's only a matter of time before something slips. Gen Z's work-life-tech overlap creates a unique kind of cognitive overload. This constant multitasking increases the risk of mistakes: sending a wrong file to a wrong client, overlooking a phishing email, misconfiguring access permissions. It's not about carelessness — it's about the sheer volume of digital demands pulling attention in all directions. And in cybersecurity, even one small lapse can have big consequences,' said Evgeny Kuskov, Security Expert at Kaspersky. To help Gen Z navigate the digital risks that come with their multi-hustle lifestyle, Kaspersky has developed Case 404 — an interactive cybersecurity game where players step into the shoes of a digital detective. Designed specifically for Gen Z, the game simulates real-world scenarios they face daily. Through immersive storytelling and challenges inspired by phishing attacks and credential leaks, Case 404 helps players recognize cybersecurity threats and teaches them how to spot risks before mistakes happen. To avoid falling a victim from cybercriminals, Kaspersky recommends to: ● Separate work and personal environments: Use different devices for personal and professional tasks to reduce cross-contamination risks. ● Watch out for fake tool updates: Download work tools like Zoom or Teams only from official websites or app stores from trusted developers — not from third-party links or emails. ● Use strong, unique passwords and avoid reusing passwords across platforms. Use a password manager to securely store and generate strong passwords. ● Avoid installing unofficial browser extensions or apps for productivity unless they're verified and approved — especially on work-connected devices. ● Slow down when dealing with urgent messages or unfamiliar contacts. Phishing often thrives on rushed decisions. ● Enable multi-factor authentication (MFA), especially for email, cloud storage, and freelance platforms. ● Use a reliable security solution, like Kaspersky Premium, to detect malicious attachments that could compromise your data. ● Ensure secure browsing and safe messaging with Kaspersky VPN, protecting your IP address and preventing data leaks.

Stock markets rise
Stock markets rise

Daily Tribune

time4 days ago

  • Daily Tribune

Stock markets rise

Stock markets in the United States and Europe rose yesterday as investors turned their attention from trade deals to a slew of company results falling this week. New York's tech-heavy Nasdaq and the broad S&P 500 indices moved confidently higher out of the gate, though the Dow was struggling. London's FTSE, the CAC 40 in Paris and the DAX in Frankfurt were all trading higher, reversing dives a day earlier. The picture in Asia was mixed, though, with Shanghai closing higher but Hong Kong and Tokyo losing ground. The transatlantic bounce was different from Monday, when European indices closed in the red and US ones were muddled in the wake of the EU-US trade deal announced on the weekend. 'The fact that markets have bounced back today suggests investors have been buoyed by hopes that the US-EU trade accord might draw a line under recent uncertainty, offering European businesses a clearer path forward,' said Fawad Razaqzada, market analyst at Still, on the currency market, the euro extended losses against the dollar, indicating that European disgruntlement at the trade deal had not gone away. The euro has 'suffered a nasty battering... as investors questioned just how positive the US-EU trade deal was for the European Union', said David Morrison, senior market analyst at Trade Nation. Earning reports Tuesday's focus was now more on company earning reports that are raining down this week in the United States and Europe, with tech heavyweights in the spotlight. Meta and Microsoft were to give results on Wednesday, with Amazon and Apple following on Thursday. The massive investment race in artificial intelligence was informing much of the action. Bloomberg News reported that Microsoft was in talks to keep access to OpenAI technology, even if the ChatGPT maker achieves AI that goes beyond human intelligence. Meta, meanwhile, has opened its pockets wide to grab AI talent -- including several OpenAI employees -- to build out its own artificial intelligence operations. Amazon and Apple are also competing, though the latter is seen to be badly lagging so far. Thomas Mathews, a markets analyst at Capital Economics, said a continued rally in US stocks 'may depend especially heavily on 'big tech' profit results continuing to paint a positive picture, especially around AI'. 'With the worst of the risks around trade seemingly fading, we suspect there are fewer remaining obstacles to further investor enthusiasm for AI and its implications for US companies,' he said. London's FTSE was boosted in particular by heavyweight AstraZeneca after the drugmaker posted strong earnings. Shares in eyewear giant EssilorLuxottica jumped more than 6% on strong second-quarter results, topping the Paris CAC 40 index. Swedish music streamer Spotify's shares slid 7% after it reported an operating profit that far missed its target. The US Federal Reserve, meanwhile, was to begin Tuesday its two-day policy meeting under increasing pressure from President Donald Trump to slash rates, despite stubbornly high inflation. Oil prices extended Monday's rise after Trump shortened a deadline for Russia to end its war in Ukraine to August 7 or 9, following which he vowed to sanction countries buying its crude.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store