ScanBeyond
Digital & QR

What to Do If You Scanned a Fake QR Code

QR codes are everywhere — and that ubiquity is exactly what makes them a compelling attack surface. A fraudulent QR code looks identical to a real one. You scan it without a second thought. What happens next depends on what type of scam it was designed for.

9 min read Last updated: May 2026 ~1,750 words

What Is QR Code Phishing (Quishing)?

QR code phishing — sometimes called "quishing" — is a cyberattack that uses malicious QR codes to redirect victims to fraudulent websites, download malware, or harvest personal and financial credentials. The word "quishing" combines "QR" with "phishing," the broader category of deceptive credential theft.

Unlike traditional phishing, which arrives via a suspicious email link you can hover over, QR codes are opaque — you can't read a QR code the way you'd read a URL. This opacity is the core vulnerability. Your brain has been conditioned to trust printed QR codes in physical spaces because, for most of digital history, they were created by legitimate businesses for legitimate purposes.

FBI reporting from 2024 indicates that QR code fraud losses reached hundreds of millions of dollars in the United States, with the problem accelerating as mobile QR scanning became seamlessly integrated into phone camera apps. The attack vector is especially effective against people who are not security-conscious, because scanning a QR code feels mundane and routine.

Where Fake QR Codes Are Found

Malicious QR codes appear in a surprising range of locations:

How the Attack Works

Once you scan a malicious QR code, one of several things can happen depending on how the code was designed:

Credential Phishing

The most common attack. The QR code redirects you to a website that appears to be a legitimate service — your bank, PayPal, a parking payment portal, Microsoft login, or Amazon. The site looks pixel-perfect. When you enter your credentials, they are sent to the attacker in real time, often triggering automatic account takeover before you've even noticed anything wrong.

Payment Harvesting

You're taken to a fake payment form that collects credit card numbers, expiration dates, and CVV codes. This is especially common with parking meter QR stickers. The payment form may even display a fake "success" message to avoid immediate suspicion.

Malware Installation

The QR code links to a download or exploits a mobile browser vulnerability to install malware. This can enable keystroke logging, camera access, location tracking, or SMS interception — critical for bypassing two-factor authentication.

App Store Spoofing

The code directs you to a fake app store page or a direct APK download (on Android) that installs a malicious app designed to mimic a banking or utility app.

⚠️ Critical Risk

Simply visiting a malicious URL — even without entering any information — can sometimes be enough to trigger a browser exploit on an unpatched device. Always keep your mobile OS and browsers updated.

What to Do Right After Scanning (But Before Entering Data)

If you scanned a QR code and the destination URL looks suspicious, or you're not 100% sure where it came from:

  1. 1
    Do not interact with the page. Don't tap anything, don't scroll, don't fill in any field. Close the browser tab immediately.
  2. 2
    Check the URL before proceeding. Most phone cameras now show you the URL before opening it. A parking payment URL like parkmeter-pay.xyz is not the same as your city's official payment portal. Look for misspellings, unusual domains, or HTTP instead of HTTPS.
  3. 3
    Clear your browser history and cache for the session. On iOS: Settings → Safari → Clear History and Website Data. On Android Chrome: Settings → Privacy → Clear Browsing Data.
  4. 4
    Run a malware scan. On Android, use Google Play Protect (built in) or a reputable security app to scan for potentially harmful apps. On iOS, the sandboxed architecture makes drive-by installs very rare, but keep iOS updated.
  5. 5
    Report the QR code. Notify the business, parking authority, or location where you found it so they can remove it and warn others. If you're at a parking meter, contact your city's transportation department.

What to Do If You Entered Information

Act immediately based on what you entered:

If You Entered a Password

If You Entered Payment Card Details

If You Entered Your Social Security Number or ID Information

✓ Good News

If you only scanned the code and closed the page without entering any information, your risk is low. Most QR phishing attacks require your active input to cause harm. Still clear your browser cache and monitor your accounts for a week.

How to Spot a Fake QR Code Before Scanning

Prevention is always better than remediation. Here's what to check before you scan:

Types of Damage Scammers Can Cause

Understanding what's at stake clarifies why fast action matters:

Prevention Going Forward

Not sure if a QR code destination URL is safe?

Paste the URL into ScanBeyond and get an instant risk analysis before you interact with the site.

Scan the URL — Free

Frequently Asked Questions

Can just scanning a QR code (without clicking anything) infect my phone?
Simply scanning a QR code with your camera app does not inherently cause harm — the code just encodes a URL. The risk arises when your browser navigates to the destination and that destination contains exploit code. Keeping your OS and browser updated dramatically reduces this risk. If you only scanned and immediately closed without the browser loading, you're almost certainly fine.
I paid a parking meter with a QR code that looked slightly off. What should I do?
Contact your credit card company or bank immediately and report the transaction as potentially fraudulent. Ask them to monitor for unusual charges and, if you provided your full card number on the site, request a new card. Report the meter location to your city's transportation or parking authority so they can investigate and remove any fraudulent stickers.
Are QR codes in emails always dangerous?
Not always, but QR codes in unsolicited emails are high risk. If you did not initiate the communication and the email asks you to scan a QR code to log in, verify an account, or complete a payment, treat it as phishing. Legitimate companies do not require you to scan a QR code from an email for authentication. Navigate directly to the company's website instead.
Can iPhones be affected by malicious QR codes?
iOS's sandboxed architecture makes drive-by malware installation extremely rare. However, credential phishing via QR code is just as effective on iPhones because the attack exploits human psychology rather than OS vulnerabilities. An iOS user is equally at risk of entering their password or payment details into a convincing fake website.