How QR codes caught out the security pros
Davey Winder reveals how even experienced security professionals can be snared by rogue QR codes
I recently warned about the hidden security threat posed by QR codes, those giant barcodes used for marketing just about everything these days. I’ve seen them in magazines, on posters and even a giant one on the back of a bus, although I’m still unsure how anyone was meant to scan that. Yet scan them people do, sometimes with the promise of a free something-or-other, but more often than not without any promise of anything (and that includes what web page you’ll end up on).
As I warned in that feature: "QR codes present one of the biggest hidden security threats, precisely because genuine marketing campaigns rely upon the curiosity factor to get consumers to scan them; don’t think for a moment that the bad guys have failed to notice this."
I adopt a simple solution to the QR conundrum by just saying no
Now you might think that such advice wouldn’t be required for those working within the IT industry, who tend to be a bit more security savvy than your average user, and certainly not for those whose particular niche within the industry is information security itself. Well think again, if the results of a little experiment perpetrated by GreenSQL founder David Maman are anything to go by.
During the course of a three-day security conference in London recently, a poster on the wall of the hall featured the logo of a well-known security vendor, the words "Just scan to win an iPad" and a QR code. That poster had been created and stuck there by David, but neither the organisers of the event, nor the security vendor whose logo was featured, bothered to ask what it was doing there or request that it be taken down.
Some 445 people did scan the QR code and browsed the page that it linked to. At this point it’s worth a reminder that this was a conference for IT security professionals. All they actually got when they scanned that QR code was a web page featuring a smiley face, but it could have been a piece of malware, or one of a multitude of poisoned URL attacks.
The scanning was perpetrated via a variety of smartphones and tablets, and as we all know, most people don’t believe that such devices require any kind of antivirus or URL filtering to protect them. Even the usual advice of "don’t scan it unless it comes from a reliable source" wouldn’t help in this case, because it appeared to come from an impeccable source, and bad guys won’t shrink from pretending to be good guys if it will get you to click a link or scan a barcode.
Personally, I adopt a simple solution to the QR conundrum by just saying no. After all, they usually just point to more marketing junk that you can do without...