📌 The 30-Second Version
QR-code phishing — known as quishing — has surged in 2025 with average losses of about $1,225 per victim. The structural problem: QR codes are opaque to humans (you cannot read the URL until after scanning) and they bypass spam filters that inspect text-based URLs. Scammers place fraudulent stickers over legitimate parking-meter and restaurant-menu QR codes, attach QR codes to unsolicited packages (FBI 2025 alert), send fake toll-payment texts with QR-code links (June-July 2025 wave in IL / NJ / VA), and embed QR codes in corporate phishing emails to bypass email security. Five variants. The unifying defense: type the URL yourself rather than scanning a QR code from any unverified source. For parking, tolls, restaurants, and banks, real businesses publish URLs you can type directly. The QR code is a convenience layer; bypassing it costs twenty seconds and defeats every variant.
⚡ Quick Safety Rules
- Type the URL yourself. Parking, tolls, restaurants, banks, government — all have published URLs you can type directly. Bypassing the QR code is the highest-impact protective action.
- Inspect QR codes for sticker overlay. Real codes are printed under laminate or etched; a fresh sticker on top is the diagnostic.
- Preview the URL before tapping through. Phone QR scanners show the URL first. Lookalike domains and unfamiliar TLDs are the diagnostic.
- Never scan QR codes from unsolicited sources. Packages, texts, emails — if you didn't initiate, the QR is suspect by default. FBI 2025 alert covers the package variant explicitly.
- Toll-text scams: state authorities mail unpaid-toll notices, never text. Type the toll-authority URL (e-zpassny.com, sunpass.com, etc.) directly to verify.
- Corporate quishing: never scan QR codes in unsolicited work emails. Verify with IT helpdesk through the established channel first.
🪞 Is this QR code a scam? — 30-second self-check
Run before scanning. Two or more "yes" answers and the answer is yes.
- Is the QR code on a sticker that has been placed over a printed or molded QR code?
- Did the QR code arrive in an unsolicited package, text, or email you did not initiate?
- Does the URL preview show a domain that does not match the expected business / agency?
- Is the page reached through the QR code asking for credit-card or login credentials immediately?
- Did the QR code arrive via a text claiming unpaid tolls, missed package delivery, or urgent payment?
2+ yes: QR-code scam. Do not scan or do not enter information. Type the official URL directly. → Skip to What to Do
Jump to a Variant
The Anatomy of a $1,225-per-Victim Average and Bypassed Spam Filters
Per CNBC's July 2025 analysis of FBI / FTC / state-agency data, average losses to quishing scams are about $1,225 per victim. The structural reason for the rise is two-part: QR codes are opaque to humans (you cannot read the URL until after scanning, unlike a text link where you can hover or read the displayed URL first), and QR-encoded URLs bypass most email spam filters and SMS abuse filters that inspect text-based URLs. The bypass means scammers get higher delivery rates with QR-encoded payloads than with traditional phishing links.
The variants concentrate in two categories: physical (sticker overlays on parking meters and restaurant menus) and digital (QR codes embedded in unsolicited packages, texts, and emails). The physical variants exploit consumer trust in the underlying object — the parking meter is real, the menu is real, but the QR code has been substituted. The digital variants exploit the spam-filter bypass plus the opacity of the URL until scanning.
The protective architecture is mature. The FTC's December 2023 consumer alert on QR-code phishing established the consumer-education baseline; the FBI's 2025 alert on unsolicited-package QR codes extended it. NYC DOT issued a parking-meter-specific advisory in 2025; multiple state DOTs followed for the toll-text wave. The protective tool that consistently works at the individual level is one rule: type the URL yourself rather than scanning a QR code from any unverified source.
What These Scams Actually Are
QR-code scams share a single structural feature: opaque URL routing. The scammer routes the scanner to a destination of their choice; the scanner cannot inspect the destination until after the routing has happened (or, with URL-preview-enabled scanners, until just before the routing). Variants differ in where the malicious code is placed, but the underlying mechanic is identical.
- Sticker-overlay variants physically substitute a malicious code for a legitimate one. Parking meters, restaurant menus, public transit posters, charity-donation kiosks, gas-station pumps. The legitimate object provides credibility; the substituted code provides the redirect.
- Unsolicited-delivery variants place the code where the scanner would not normally encounter it — an unexpected package on the doorstep, a text claiming an unpaid toll, an email claiming a missed package delivery, an email claiming an MFA-reset request from IT. The unexpected delivery itself bypasses the scanner's normal verification habit.
- Spam-filter bypass. QR codes embedded as images in emails are not parsed for URLs by traditional spam filters. Modern email-security tools have begun parsing QR codes inside images (Microsoft, Proofpoint, Google have added QR-OCR scanning in 2024-2025), but coverage is uneven and lagging behind attacker innovation.
- Phishing-or-malware payload. The destination is either a credential-harvesting page that mimics a legitimate site (parking authority, restaurant ordering, bank login, employer SSO) or a malware-installation page that exploits browser or OS vulnerabilities. Mobile devices are higher-value targets than desktops because they store payment credentials, banking apps, and authentication tokens.
🔑 The single rule that defeats every variant — type the URL yourself rather than scanning
Real businesses and government agencies publish URLs you can type directly. Your city's parking authority, the toll authority for your state, your favorite restaurant, your bank, your employer's SSO portal — all have published web addresses. Typing the URL takes twenty seconds and bypasses every QR-code scam variant. Save the URLs in a Notes app or browser bookmarks for quick access; the convenience layer that QR codes provide is rarely worth the verification gap they create.
The 5 Variants
A fake QR-code sticker placed over (or next to) the legitimate QR code on a city parking meter routes drivers to a phishing site that captures credit-card info. NYC DOT issued a public warning in 2025. Real city parking codes are printed directly onto the meter housing, etched into metal, or printed under a clear protective laminate; if the QR is on a peelable sticker, it has been added or modified. The protective rule: type your city's parking-payment URL directly, or pay the meter with coins or card-tap if available.
A representative case from NYC DOT advisories and r/Scams threads: a driver parks in midtown Manhattan, scans the QR code on the meter to pay, and is routed to what looks like the official ParkNYC site — same color scheme, same logo, similar URL. She enters her credit-card information and pays $7.50 for two hours. Two days later her card shows $1,400 in charges from gas stations in different states. The QR code she scanned was a sticker placed over the real ParkNYC code; the destination was a phishing site that captured her full card details and mimicked a successful payment. Real ParkNYC payments work without entering card details — the city uses the official ParkNYC mobile app or the meter's own card-tap reader, both of which keep card data within established payment processors.
The variant has appeared in NYC, Austin, Houston, Atlanta, San Francisco, Boston, San Diego, Denver, and dozens of other U.S. cities in 2025. The protective infrastructure is the city parking authority's own app or the meter's physical card-tap reader. Drivers who default to the physical card-tap or the official app rather than scanning the meter's QR code structurally avoid the variant.
What stops it is the type-the-URL or use-the-app rule. For city parking, install the city's official parking app directly from the App Store or Google Play (search the official app name like ParkNYC, ParkMobile, PayByPhone). Do not scan QR codes on parking meters. If you have already scanned a fraudulent QR code and entered card details, dispute the charges immediately with your card issuer and call the issuer's fraud line. File at reportfraud.ftc.gov and report the parking-meter location to your city's transportation authority.
Red Flags
- QR code is on a sticker that can be peeled off (real codes are usually under laminate or etched)
- Phishing-site URL does not match your city's official parking-app domain
- Page asks for full card details rather than routing to an app or established payment processor
- Page mimics the city's branding but uses a slightly different URL
Defenses
- Install the city's official parking app from App Store / Google Play directly
- Use the meter's physical card-tap reader if available
- Pay with coins if available (oldest defense, still works)
- Type your city's parking-authority URL directly rather than scanning
- If scammed: dispute charges, file at FTC ReportFraud, report the meter to city transportation
Typical Money Demanded
$5–$50 in initial parking-charge bait + $200–$5,000 in subsequent fraudulent charges on the captured card · NYC DOT + multi-city advisories document the pattern.
— The second variant runs the same script in restaurants. The QR code is on the menu instead of the meter, and the destination mimics the restaurant's ordering site. —
A fraudulent QR-code sticker placed on a restaurant menu or table tent routes diners to a phishing site that captures credit-card info while pretending to be the restaurant's ordering system. The variant exploits the QR-menu habit normalized during 2020-2022 and continued by many restaurants. Real restaurant QR codes are usually printed under laminate or onto laminated plastic table tents; a fresh paper sticker on top is the diagnostic.
A representative case: a diner at a casual restaurant scans the QR code on the table tent to pay her bill. The page that loads looks like a generic restaurant payment system — restaurant name visible at the top, item list correct, total $47.50. She taps "Pay with Card," enters her card information, and the page confirms the payment. Three days later the card statement shows the $47.50 to the restaurant plus an additional $2,800 in unauthorized charges to a chain of online merchants. The actual restaurant's payment system never received the $47.50 — the QR code routed to a phishing site that captured her full card details, and the restaurant's actual server brought a paper bill twenty minutes later when she had not paid through their official system.
The variant is structurally similar to parking-meter QR fraud — physical sticker overlay on a legitimate code — but harder to spot because restaurant QR codes vary widely in format (paper inserts, plastic stands, printed-on-menu, QR code on receipt) and diners do not have a strong baseline for what the legitimate code should look like. The protective rules: ask the server to confirm the menu / payment URL before scanning, type the restaurant's URL directly, or pay at the counter with the server. Avoid entering credit-card information on any QR-code-reached restaurant ordering page; pay at the counter or with the server using a card-tap reader instead.
What stops it is server-mediated payment plus URL verification. Pay at the counter or with the server using a physical card-tap or chip reader rather than through a QR-code-reached payment page. If you must use the QR code, ask the server to confirm the URL and inspect the destination domain before entering card information. If scammed, dispute the charges immediately and report to the restaurant (whose physical menu was tampered with) and to the FTC.
Red Flags
- QR code is on a fresh paper sticker rather than printed on the laminated menu
- Page URL does not match the restaurant's published domain
- Page asks for full credit-card details (legitimate restaurants usually use established payment processors like Stripe, Square, Toast)
- Server is unaware of the QR code or denies the restaurant uses one
Defenses
- Pay at the counter or with the server using card-tap / chip / cash
- Ask the server to confirm the QR-code URL before scanning
- Type the restaurant's URL directly when possible
- Inspect the destination domain after scanning, before entering card details
- If scammed: dispute charges, notify the restaurant, file at FTC + state AG
Typical Money Demanded
$20–$100 in restaurant-bill bait + $500–$5,000 in subsequent fraudulent charges on the captured card.
— The third variant moves the QR code into something the recipient never asked for. The unsolicited package itself is the bait. —
An unsolicited package arrives at the recipient's address with a QR code attached. The QR code routes to a phishing site that captures personal information (or in some cases installs malware). The FBI's 2025 alert documents the variant explicitly: "Unsolicited Packages Containing QR Codes Used to Initiate Fraud Schemes." The structural feature: an unexpected package alone is not the scam, but the QR code attached to it is.
A representative case from FBI alert documentation: a recipient finds an unmarked package on the doorstep containing a small consumer item (lip balm, USB cable, costume jewelry — items with low retail value). Attached to the package or printed on the inside of the box is a QR code with text reading "Scan to identify the sender" or "Scan to verify delivery." The QR code routes to a page asking for the recipient's name, address, phone number, and date of birth. In other variants, the page captures payment information for a "small return-shipping fee" or installs a tracking app on the recipient's phone. The package itself is the bait; the QR code is the actual fraud vector.
The variant overlaps with brushing scams (where unsolicited packages are sent to addresses to support fake reviews on e-commerce platforms) but the QR-code variant adds a fraud-extraction layer to the brushing infrastructure. The FBI's 2025 alert is unambiguous: do not scan QR codes attached to unsolicited packages. If you receive an unexpected package, contact the carrier (USPS, FedEx, UPS, Amazon) directly through their published number to verify the delivery, and dispose of any unsolicited package without scanning anything.
What stops it is the FBI's protective rule. Do not scan QR codes attached to unsolicited packages, regardless of what the messaging claims. If the package is genuinely unexpected, contact the carrier directly through their published number to verify before any scanning. If you have already scanned and provided personal information, place fraud alerts at the three credit bureaus, change passwords for any accounts that may have been compromised, and file at reportfraud.ftc.gov + ic3.gov.
Red Flags
- Unsolicited package with no clear sender
- QR code attached to or printed inside the package
- Messaging like "Scan to identify sender" or "Scan to verify delivery"
- Item inside the package has low retail value (typical brushing-scam pattern)
Defenses
- Do not scan QR codes attached to unsolicited packages (FBI 2025 alert)
- Contact the carrier directly through their published number to verify any unexpected delivery
- Dispose of unsolicited packages without scanning
- If already scanned: fraud alerts at three bureaus, change passwords, file FTC + IC3
Typical Money Demanded
$0–$50 small "return shipping fee" as initial bait + identity-theft losses from captured personal info · FBI 2025 alert documents the variant explicitly.
— The fourth variant moves to text messages. A wave of fake toll-payment texts hit drivers in multiple states in 2025. —
A text message claims the recipient owes a small amount ($5-$15) in unpaid tolls and includes a QR code or link to pay. The destination phishing site mimics the state toll authority (E-ZPass, Sunpass, EZ-TAG) and captures credit-card info. Major waves hit Illinois, New Jersey, Virginia, and several other states in June-July 2025. Real state toll authorities communicate unpaid-toll notices by mail through the registered owner of the vehicle, not by text.
A representative case: a driver in New Jersey receives a text on a Tuesday morning: "E-ZPass Tolls Service: You have an outstanding toll balance of $12.75. Pay now to avoid a $50 late fee. [QR code or link]." She scans the QR code; the page is a polished E-ZPass clone with the agency's logo, layout, and a payment form. She enters her credit-card information to pay the $12.75 plus a $2 "convenience fee." The page confirms the payment. Three days later her card shows the $14.75 charge plus an additional $3,400 in unauthorized charges. The real E-ZPass NJ system has no record of any unpaid balance on her account. The text was a bulk-send fake; the QR code routed to a phishing site that captured her card details.
The toll-text wave that hit IL / NJ / VA in June-July 2025 generated thousands of complaints to state DOTs and consumer-protection offices. The protective architecture is straightforward: real state toll authorities mail unpaid-toll notices to the registered owner of the vehicle through USPS, with a printed account number and payable amount, and the resolution path is to log into the toll authority's published website (typed directly) to verify and pay. Texts claiming unpaid tolls are diagnostic of fraud across all U.S. state toll authorities.
What stops it is the type-the-URL rule plus the no-text-from-tolls rule. State toll authorities never text about unpaid tolls. If you receive a text claiming unpaid tolls, type your state's toll-authority URL directly (e-zpassny.com, sunpass.com, ez-tag.com, etc.) to verify your account balance. If you have already paid via the fake text, dispute the charges immediately and report at reportfraud.ftc.gov + your state DOT consumer-protection line.
Red Flags
- Text message claiming unpaid tolls (real state authorities mail, never text)
- QR code or link in the text
- Small bait amount ($5-$15) with urgent-payment framing ("avoid late fee")
- Destination domain does not match the state toll authority's published URL
Defenses
- Never pay tolls based on inbound text
- Type your state's toll-authority URL directly to verify any actual balance
- Forward toll-text scams to 7726 (SPAM) and to your state DOT
- If paid: dispute charges, file FTC, report to state DOT consumer-protection
Typical Money Demanded
$5–$15 in toll-bait charges + $1,000–$5,000 in subsequent fraudulent charges on the captured card · IL / NJ / VA waves June-July 2025.
— The fifth variant moves the QR code into the workplace. Email-embedded QR codes bypass spam filters that inspect text-based URLs. —
A phishing email contains a QR code (typically as an embedded image) routing to a credential-harvesting page mimicking Microsoft 365, Google Workspace, Okta, or the employer's SSO portal. The QR-code framing bypasses traditional email spam filters. The variant has surged in 2025 according to multiple corporate-security advisories. The protective rule for workplace contexts: never scan a QR code in an unsolicited email; verify with IT through the established helpdesk channel before scanning.
A representative case from corporate-security advisories: an employee at a mid-size company receives an email purporting to be from IT, with a subject line like "Your password expires in 24 hours — scan to reset" and a body containing a QR code as an embedded image. The recipient scans the QR code with their phone; the page loads what looks like the company's SSO portal, asks for the employee's username and password (and sometimes a second-factor token), and "fails" the login with a generic error. The credentials have been captured. The attacker then uses the captured credentials to access the corporate environment from the attacker's network, typically from outside the geofence the SSO would block on a desktop login.
The QR-on-mobile aspect is structural: scanning a QR code with a phone routes the credential-harvesting page to the phone's browser, which is outside the corporate desktop's protected network and outside many of the security controls that would catch a desktop-side phishing attempt. Mobile devices typically lack the URL-inspection plugins, certificate-pinning enforcement, and DNS-filtering that desktop browsers in corporate environments have. Email-security vendors (Microsoft Defender, Proofpoint, Mimecast) have begun adding QR-OCR scanning in 2024-2025, but coverage is uneven and lagging behind attacker innovation.
What stops it is the IT-helpdesk verification rule. Never scan a QR code in an unsolicited work email, even if it appears to be from your IT department. Verify the request through the established IT-helpdesk channel before scanning. If you have scanned and entered credentials, contact your IT-security team immediately (the established channel, not via the phishing email). Change the password through the SSO portal directly (typed URL), enable additional MFA factors, and notify any teams whose accounts may have been compromised.
Red Flags
- Email purporting to be from IT with "password expires" or "MFA reset" framing
- QR code embedded as an image in the email body
- Urgent timeline ("expires in 24 hours")
- Sender address differs from established IT-helpdesk address
Defenses
- Never scan QR codes in unsolicited work emails
- Verify any IT-related request through the established IT-helpdesk channel first
- Type the SSO portal URL directly if you need to reset a password
- If scanned + credentials entered: notify IT-security immediately, change passwords, enable additional MFA
Typical Money Demanded
Variant typically targets credentials rather than direct payment · downstream cost is corporate-account compromise: data exfiltration, ransomware, or wire-fraud authorization · per-incident cost to the company can reach $50K-$10M+.
The Numbers (and Where They Come From)
🆘 What to Do If You've Scanned a Malicious QR Code
💳 Card Issuer Fraud Line — Immediate
If you entered card details, dispute charges under FCBA (60 days) and call the issuer's fraud line. Block the card; have a new card issued.
🔐 Change Passwords + Enable MFA
If you entered login credentials, change the password immediately and enable two-factor authentication. Check the account for unauthorized activity.
🛡 Three-Bureau Fraud Alert
If you provided SSN or sensitive identifiers, place fraud alerts at Equifax, Experian, TransUnion. Consider a credit freeze.
📱 Mobile-Security Scan
Run a mobile-security scan, restart the device, remove unfamiliar apps. For high-stakes accounts, consider a factory reset.
📋 FTC ReportFraud
File at reportfraud.ftc.gov.
🏛 IC3 — If Loss Over $1,000
File at ic3.gov (FBI Internet Crime Complaint Center).
🏢 IT-Security Team (Corporate Quishing)
If workplace credentials were entered, notify IT-security through the established channel (not via the phishing email). They can rotate credentials and check for compromise.
📍 Report Tampered Physical QR
For parking-meter / restaurant / public QR sticker overlays, report to the city transportation authority, the restaurant manager, or the venue operator so they can remove the fraudulent sticker.
If You're Reporting Outside the United States
- United Kingdom: Action Fraud; the National Cyber Security Centre publishes QR-phishing guidance.
- Canada: CAFC.
- Australia: Scamwatch (ACCC).
- European Union: National consumer-protection agencies + ENISA QR-phishing advisories.
- Ireland: An Garda Síochána Garda National Cyber Crime Bureau.
Frequently Asked Questions
What is a QR code scam?
What's the single best defense?
How can I tell if a QR code has been tampered with?
What is the unsolicited-package QR code scam?
What is the toll-text QR scam?
What is restaurant-menu QR code fraud?
What is corporate quishing?
I've already scanned a malicious QR code — what now?
Related Reading
- Package-Text Scams — The text-channel cousin of QR-code scams. USPS / FedEx / UPS impersonation texts use the same phishing-page mechanics.
- Phone-Impersonation Government Scams — Same caller-ID-spoofing structure applied to phone calls.
- Recovery Scams — The parasite layer that follows QR-code victim posts.