Cybercriminals are increasingly adopting QR codes as a vector for phishing attacks, moving away from traditional malicious links in text messages. A recent campaign, reported on April 3, 2026, involves fake traffic violation or unpaid toll notices that are sent to victims. These notices, which impersonate government agencies, contain a QR code and instruct the target to scan it to pay a small, seemingly plausible fine. The QR code directs the victim's mobile device to a convincing phishing website designed to steal their full payment card details and other personal information. This evolution in tactics preys on a user's potential trust in QR codes over suspicious links and the urgency created by impersonating an authority figure.
This phishing technique, sometimes called "quishing" (QR code phishing), represents an adaptation by criminals to bypass both user awareness and technical controls.
This method is effective because it moves the malicious URL from a text-based format, which can be inspected by security software and savvy users, to a graphical format that is opaque to the user before scanning.
T1566 - Phishing. This is a classic phishing attack that has simply updated its delivery mechanism.T1598.003 - Spearphishing Link. The attackers create and host the phishing pages (phishkits) that mimic official sites.T1608.003 - Impersonation. The entire scam relies on successfully impersonating a government or transportation authority.The financial impact of these scams is significant. The FBI's 2025 Internet Crime Complaint Center (IC3) report noted that government impersonation scams accounted for nearly $800 million in losses. Each successful victim of this QR code scam loses their payment card information, which can be used for fraudulent purchases or sold on dark web marketplaces. The victim may also lose the amount of the "fine" they thought they were paying. For the impersonated government agencies, these scams erode public trust and can overwhelm their call centers with inquiries from confused citizens.
For individuals and organizations, detection is about skepticism and verification.
The most effective mitigation is to train users to be skeptical of unsolicited requests and to verify them through independent channels.
Using mobile security or web filtering solutions can block access to the malicious phishing pages after the QR code is scanned.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats