📷 Scam Guide · 2026 · Everywhere

QR Code Scams: 5 Quishing Variants and the Type-the-URL Rule

Quishing scams cost victims an average of $1,225 each in 2025. The FBI issued a 2025 alert on unsolicited-package QR codes; NYC DOT warned about parking-meter QR overlays; the FTC published consumer alerts on QR-sticker tampering. A wave of fake toll-payment texts hit Illinois, New Jersey, and Virginia drivers in June-July 2025. Five variants — parking-meter sticker overlay, restaurant-menu QR, unsolicited-package QR, toll-text QR, and corporate-quishing email. Real Reddit stories, federal-source verified, and the type-the-URL rule that defeats them all.

💬 Channels: Physical sticker · Text · Email · Package 📅 Updated May 2026 📑 5 variants documented ⭐ FBI · FTC · NYC DOT verified
🎯 Target: Anyone with a phone camera 📈 2025 average loss per victim: $1,225 📉 FBI 2025 alert: Unsolicited-package QR codes
📖 8 min read

📌 The 30-Second Version

QR-code phishing — known as quishing — has surged in 2025 with average losses of about $1,225 per victim. The structural problem: QR codes are opaque to humans (you cannot read the URL until after scanning) and they bypass spam filters that inspect text-based URLs. Scammers place fraudulent stickers over legitimate parking-meter and restaurant-menu QR codes, attach QR codes to unsolicited packages (FBI 2025 alert), send fake toll-payment texts with QR-code links (June-July 2025 wave in IL / NJ / VA), and embed QR codes in corporate phishing emails to bypass email security. Five variants. The unifying defense: type the URL yourself rather than scanning a QR code from any unverified source. For parking, tolls, restaurants, and banks, real businesses publish URLs you can type directly. The QR code is a convenience layer; bypassing it costs twenty seconds and defeats every variant.

⚡ Quick Safety Rules

🪞 Is this QR code a scam? — 30-second self-check

Run before scanning. Two or more "yes" answers and the answer is yes.

  1. Is the QR code on a sticker that has been placed over a printed or molded QR code?
  2. Did the QR code arrive in an unsolicited package, text, or email you did not initiate?
  3. Does the URL preview show a domain that does not match the expected business / agency?
  4. Is the page reached through the QR code asking for credit-card or login credentials immediately?
  5. Did the QR code arrive via a text claiming unpaid tolls, missed package delivery, or urgent payment?

2+ yes: QR-code scam. Do not scan or do not enter information. Type the official URL directly. → Skip to What to Do

Jump to a Variant

  1. High Parking-Meter Sticker Overlay
  2. High Restaurant-Menu QR Sticker
  3. High Unsolicited-Package QR Code (FBI 2025 Alert)
  4. High Toll-Text QR Scam (E-ZPass / Sunpass Impersonation)
  5. Med Corporate Quishing (Email-Embedded QR)

The Anatomy of a $1,225-per-Victim Average and Bypassed Spam Filters

Per CNBC's July 2025 analysis of FBI / FTC / state-agency data, average losses to quishing scams are about $1,225 per victim. The structural reason for the rise is two-part: QR codes are opaque to humans (you cannot read the URL until after scanning, unlike a text link where you can hover or read the displayed URL first), and QR-encoded URLs bypass most email spam filters and SMS abuse filters that inspect text-based URLs. The bypass means scammers get higher delivery rates with QR-encoded payloads than with traditional phishing links.

The variants concentrate in two categories: physical (sticker overlays on parking meters and restaurant menus) and digital (QR codes embedded in unsolicited packages, texts, and emails). The physical variants exploit consumer trust in the underlying object — the parking meter is real, the menu is real, but the QR code has been substituted. The digital variants exploit the spam-filter bypass plus the opacity of the URL until scanning.

The protective architecture is mature. The FTC's December 2023 consumer alert on QR-code phishing established the consumer-education baseline; the FBI's 2025 alert on unsolicited-package QR codes extended it. NYC DOT issued a parking-meter-specific advisory in 2025; multiple state DOTs followed for the toll-text wave. The protective tool that consistently works at the individual level is one rule: type the URL yourself rather than scanning a QR code from any unverified source.

What These Scams Actually Are

QR-code scams share a single structural feature: opaque URL routing. The scammer routes the scanner to a destination of their choice; the scanner cannot inspect the destination until after the routing has happened (or, with URL-preview-enabled scanners, until just before the routing). Variants differ in where the malicious code is placed, but the underlying mechanic is identical.

🔑 The single rule that defeats every variant — type the URL yourself rather than scanning

Real businesses and government agencies publish URLs you can type directly. Your city's parking authority, the toll authority for your state, your favorite restaurant, your bank, your employer's SSO portal — all have published web addresses. Typing the URL takes twenty seconds and bypasses every QR-code scam variant. Save the URLs in a Notes app or browser bookmarks for quick access; the convenience layer that QR codes provide is rarely worth the verification gap they create.

The 5 Variants

Variant #1
High Severity
Parking-Meter Sticker Overlay
💬 Channel: Physical sticker placed on or near the legitimate QR code on city parking meters and pay stations. The fake sticker routes drivers to a phishing site that mimics the city parking-payment page and captures credit-card info. NYC DOT issued a 2025 advisory on this exact variant; multiple cities (Austin, Houston, Atlanta, San Francisco) have reported parallel cases.
Parking-Meter Sticker Overlay — comic illustration

A fake QR-code sticker placed over (or next to) the legitimate QR code on a city parking meter routes drivers to a phishing site that captures credit-card info. NYC DOT issued a public warning in 2025. Real city parking codes are printed directly onto the meter housing, etched into metal, or printed under a clear protective laminate; if the QR is on a peelable sticker, it has been added or modified. The protective rule: type your city's parking-payment URL directly, or pay the meter with coins or card-tap if available.

A representative case from NYC DOT advisories and r/Scams threads: a driver parks in midtown Manhattan, scans the QR code on the meter to pay, and is routed to what looks like the official ParkNYC site — same color scheme, same logo, similar URL. She enters her credit-card information and pays $7.50 for two hours. Two days later her card shows $1,400 in charges from gas stations in different states. The QR code she scanned was a sticker placed over the real ParkNYC code; the destination was a phishing site that captured her full card details and mimicked a successful payment. Real ParkNYC payments work without entering card details — the city uses the official ParkNYC mobile app or the meter's own card-tap reader, both of which keep card data within established payment processors.

The variant has appeared in NYC, Austin, Houston, Atlanta, San Francisco, Boston, San Diego, Denver, and dozens of other U.S. cities in 2025. The protective infrastructure is the city parking authority's own app or the meter's physical card-tap reader. Drivers who default to the physical card-tap or the official app rather than scanning the meter's QR code structurally avoid the variant.

What stops it is the type-the-URL or use-the-app rule. For city parking, install the city's official parking app directly from the App Store or Google Play (search the official app name like ParkNYC, ParkMobile, PayByPhone). Do not scan QR codes on parking meters. If you have already scanned a fraudulent QR code and entered card details, dispute the charges immediately with your card issuer and call the issuer's fraud line. File at reportfraud.ftc.gov and report the parking-meter location to your city's transportation authority.

Red Flags

  • QR code is on a sticker that can be peeled off (real codes are usually under laminate or etched)
  • Phishing-site URL does not match your city's official parking-app domain
  • Page asks for full card details rather than routing to an app or established payment processor
  • Page mimics the city's branding but uses a slightly different URL

Defenses

  • Install the city's official parking app from App Store / Google Play directly
  • Use the meter's physical card-tap reader if available
  • Pay with coins if available (oldest defense, still works)
  • Type your city's parking-authority URL directly rather than scanning
  • If scammed: dispute charges, file at FTC ReportFraud, report the meter to city transportation

Typical Money Demanded

$5–$50 in initial parking-charge bait + $200–$5,000 in subsequent fraudulent charges on the captured card · NYC DOT + multi-city advisories document the pattern.

— The second variant runs the same script in restaurants. The QR code is on the menu instead of the meter, and the destination mimics the restaurant's ordering site. —

Variant #2
High Severity
Restaurant-Menu QR Sticker
💬 Channel: Restaurant-table QR code (often on a small plastic table tent or a sticker on the menu itself). Scammer places a fraudulent sticker over or near the legitimate QR. The destination phishing page mimics the restaurant's online ordering / payment system and captures credit-card info. The variant exploits the QR-menu habit that became normalized during 2020-2022.
Restaurant-Menu QR Sticker — comic illustration

A fraudulent QR-code sticker placed on a restaurant menu or table tent routes diners to a phishing site that captures credit-card info while pretending to be the restaurant's ordering system. The variant exploits the QR-menu habit normalized during 2020-2022 and continued by many restaurants. Real restaurant QR codes are usually printed under laminate or onto laminated plastic table tents; a fresh paper sticker on top is the diagnostic.

A representative case: a diner at a casual restaurant scans the QR code on the table tent to pay her bill. The page that loads looks like a generic restaurant payment system — restaurant name visible at the top, item list correct, total $47.50. She taps "Pay with Card," enters her card information, and the page confirms the payment. Three days later the card statement shows the $47.50 to the restaurant plus an additional $2,800 in unauthorized charges to a chain of online merchants. The actual restaurant's payment system never received the $47.50 — the QR code routed to a phishing site that captured her full card details, and the restaurant's actual server brought a paper bill twenty minutes later when she had not paid through their official system.

The variant is structurally similar to parking-meter QR fraud — physical sticker overlay on a legitimate code — but harder to spot because restaurant QR codes vary widely in format (paper inserts, plastic stands, printed-on-menu, QR code on receipt) and diners do not have a strong baseline for what the legitimate code should look like. The protective rules: ask the server to confirm the menu / payment URL before scanning, type the restaurant's URL directly, or pay at the counter with the server. Avoid entering credit-card information on any QR-code-reached restaurant ordering page; pay at the counter or with the server using a card-tap reader instead.

What stops it is server-mediated payment plus URL verification. Pay at the counter or with the server using a physical card-tap or chip reader rather than through a QR-code-reached payment page. If you must use the QR code, ask the server to confirm the URL and inspect the destination domain before entering card information. If scammed, dispute the charges immediately and report to the restaurant (whose physical menu was tampered with) and to the FTC.

Red Flags

  • QR code is on a fresh paper sticker rather than printed on the laminated menu
  • Page URL does not match the restaurant's published domain
  • Page asks for full credit-card details (legitimate restaurants usually use established payment processors like Stripe, Square, Toast)
  • Server is unaware of the QR code or denies the restaurant uses one

Defenses

  • Pay at the counter or with the server using card-tap / chip / cash
  • Ask the server to confirm the QR-code URL before scanning
  • Type the restaurant's URL directly when possible
  • Inspect the destination domain after scanning, before entering card details
  • If scammed: dispute charges, notify the restaurant, file at FTC + state AG

Typical Money Demanded

$20–$100 in restaurant-bill bait + $500–$5,000 in subsequent fraudulent charges on the captured card.

— The third variant moves the QR code into something the recipient never asked for. The unsolicited package itself is the bait. —

Variant #3
High Severity
Unsolicited-Package QR Code (FBI 2025 Alert)
💬 Channel: An unsolicited package arrives at the recipient's address (similar to brushing scams). The package contains or has attached a QR code with messaging like "Scan to identify the sender" or "Scan for return / verification." The QR code routes to a phishing site that captures personal information or installs malware. FBI issued a public alert on this variant in 2025.
Unsolicited-Package QR Code (FBI 2025 Alert) — comic illustration

An unsolicited package arrives at the recipient's address with a QR code attached. The QR code routes to a phishing site that captures personal information (or in some cases installs malware). The FBI's 2025 alert documents the variant explicitly: "Unsolicited Packages Containing QR Codes Used to Initiate Fraud Schemes." The structural feature: an unexpected package alone is not the scam, but the QR code attached to it is.

A representative case from FBI alert documentation: a recipient finds an unmarked package on the doorstep containing a small consumer item (lip balm, USB cable, costume jewelry — items with low retail value). Attached to the package or printed on the inside of the box is a QR code with text reading "Scan to identify the sender" or "Scan to verify delivery." The QR code routes to a page asking for the recipient's name, address, phone number, and date of birth. In other variants, the page captures payment information for a "small return-shipping fee" or installs a tracking app on the recipient's phone. The package itself is the bait; the QR code is the actual fraud vector.

The variant overlaps with brushing scams (where unsolicited packages are sent to addresses to support fake reviews on e-commerce platforms) but the QR-code variant adds a fraud-extraction layer to the brushing infrastructure. The FBI's 2025 alert is unambiguous: do not scan QR codes attached to unsolicited packages. If you receive an unexpected package, contact the carrier (USPS, FedEx, UPS, Amazon) directly through their published number to verify the delivery, and dispose of any unsolicited package without scanning anything.

What stops it is the FBI's protective rule. Do not scan QR codes attached to unsolicited packages, regardless of what the messaging claims. If the package is genuinely unexpected, contact the carrier directly through their published number to verify before any scanning. If you have already scanned and provided personal information, place fraud alerts at the three credit bureaus, change passwords for any accounts that may have been compromised, and file at reportfraud.ftc.gov + ic3.gov.

Red Flags

  • Unsolicited package with no clear sender
  • QR code attached to or printed inside the package
  • Messaging like "Scan to identify sender" or "Scan to verify delivery"
  • Item inside the package has low retail value (typical brushing-scam pattern)

Defenses

  • Do not scan QR codes attached to unsolicited packages (FBI 2025 alert)
  • Contact the carrier directly through their published number to verify any unexpected delivery
  • Dispose of unsolicited packages without scanning
  • If already scanned: fraud alerts at three bureaus, change passwords, file FTC + IC3

Typical Money Demanded

$0–$50 small "return shipping fee" as initial bait + identity-theft losses from captured personal info · FBI 2025 alert documents the variant explicitly.

— The fourth variant moves to text messages. A wave of fake toll-payment texts hit drivers in multiple states in 2025. —

Variant #4
High Severity
Toll-Text QR Scam (E-ZPass / Sunpass Impersonation)
💬 Channel: Text message claiming the recipient owes $5-$15 in unpaid tolls. Message includes a QR code or link to pay. Routes to phishing site that mimics the state toll authority (E-ZPass, Sunpass, EZ-TAG) and captures credit-card info. Major waves hit Illinois, New Jersey, Virginia, and other states in June-July 2025.
Toll-Text QR Scam (E-ZPass / Sunpass Impersonation) — comic illustration

A text message claims the recipient owes a small amount ($5-$15) in unpaid tolls and includes a QR code or link to pay. The destination phishing site mimics the state toll authority (E-ZPass, Sunpass, EZ-TAG) and captures credit-card info. Major waves hit Illinois, New Jersey, Virginia, and several other states in June-July 2025. Real state toll authorities communicate unpaid-toll notices by mail through the registered owner of the vehicle, not by text.

A representative case: a driver in New Jersey receives a text on a Tuesday morning: "E-ZPass Tolls Service: You have an outstanding toll balance of $12.75. Pay now to avoid a $50 late fee. [QR code or link]." She scans the QR code; the page is a polished E-ZPass clone with the agency's logo, layout, and a payment form. She enters her credit-card information to pay the $12.75 plus a $2 "convenience fee." The page confirms the payment. Three days later her card shows the $14.75 charge plus an additional $3,400 in unauthorized charges. The real E-ZPass NJ system has no record of any unpaid balance on her account. The text was a bulk-send fake; the QR code routed to a phishing site that captured her card details.

The toll-text wave that hit IL / NJ / VA in June-July 2025 generated thousands of complaints to state DOTs and consumer-protection offices. The protective architecture is straightforward: real state toll authorities mail unpaid-toll notices to the registered owner of the vehicle through USPS, with a printed account number and payable amount, and the resolution path is to log into the toll authority's published website (typed directly) to verify and pay. Texts claiming unpaid tolls are diagnostic of fraud across all U.S. state toll authorities.

What stops it is the type-the-URL rule plus the no-text-from-tolls rule. State toll authorities never text about unpaid tolls. If you receive a text claiming unpaid tolls, type your state's toll-authority URL directly (e-zpassny.com, sunpass.com, ez-tag.com, etc.) to verify your account balance. If you have already paid via the fake text, dispute the charges immediately and report at reportfraud.ftc.gov + your state DOT consumer-protection line.

Red Flags

  • Text message claiming unpaid tolls (real state authorities mail, never text)
  • QR code or link in the text
  • Small bait amount ($5-$15) with urgent-payment framing ("avoid late fee")
  • Destination domain does not match the state toll authority's published URL

Defenses

  • Never pay tolls based on inbound text
  • Type your state's toll-authority URL directly to verify any actual balance
  • Forward toll-text scams to 7726 (SPAM) and to your state DOT
  • If paid: dispute charges, file FTC, report to state DOT consumer-protection

Typical Money Demanded

$5–$15 in toll-bait charges + $1,000–$5,000 in subsequent fraudulent charges on the captured card · IL / NJ / VA waves June-July 2025.

— The fifth variant moves the QR code into the workplace. Email-embedded QR codes bypass spam filters that inspect text-based URLs. —

Variant #5
Medium Severity
Corporate Quishing (Email-Embedded QR)
💬 Channel: Phishing email containing a QR code (often as an embedded image) that routes to a credential-harvesting site mimicking Microsoft 365, Google Workspace, or the recipient's employer's SSO portal. The QR-code framing bypasses traditional email spam filters that scan for suspicious URLs but do not yet uniformly inspect QR-encoded URLs inside images.
Corporate Quishing (Email-Embedded QR) — comic illustration

A phishing email contains a QR code (typically as an embedded image) routing to a credential-harvesting page mimicking Microsoft 365, Google Workspace, Okta, or the employer's SSO portal. The QR-code framing bypasses traditional email spam filters. The variant has surged in 2025 according to multiple corporate-security advisories. The protective rule for workplace contexts: never scan a QR code in an unsolicited email; verify with IT through the established helpdesk channel before scanning.

A representative case from corporate-security advisories: an employee at a mid-size company receives an email purporting to be from IT, with a subject line like "Your password expires in 24 hours — scan to reset" and a body containing a QR code as an embedded image. The recipient scans the QR code with their phone; the page loads what looks like the company's SSO portal, asks for the employee's username and password (and sometimes a second-factor token), and "fails" the login with a generic error. The credentials have been captured. The attacker then uses the captured credentials to access the corporate environment from the attacker's network, typically from outside the geofence the SSO would block on a desktop login.

The QR-on-mobile aspect is structural: scanning a QR code with a phone routes the credential-harvesting page to the phone's browser, which is outside the corporate desktop's protected network and outside many of the security controls that would catch a desktop-side phishing attempt. Mobile devices typically lack the URL-inspection plugins, certificate-pinning enforcement, and DNS-filtering that desktop browsers in corporate environments have. Email-security vendors (Microsoft Defender, Proofpoint, Mimecast) have begun adding QR-OCR scanning in 2024-2025, but coverage is uneven and lagging behind attacker innovation.

What stops it is the IT-helpdesk verification rule. Never scan a QR code in an unsolicited work email, even if it appears to be from your IT department. Verify the request through the established IT-helpdesk channel before scanning. If you have scanned and entered credentials, contact your IT-security team immediately (the established channel, not via the phishing email). Change the password through the SSO portal directly (typed URL), enable additional MFA factors, and notify any teams whose accounts may have been compromised.

Red Flags

  • Email purporting to be from IT with "password expires" or "MFA reset" framing
  • QR code embedded as an image in the email body
  • Urgent timeline ("expires in 24 hours")
  • Sender address differs from established IT-helpdesk address

Defenses

  • Never scan QR codes in unsolicited work emails
  • Verify any IT-related request through the established IT-helpdesk channel first
  • Type the SSO portal URL directly if you need to reset a password
  • If scanned + credentials entered: notify IT-security immediately, change passwords, enable additional MFA

Typical Money Demanded

Variant typically targets credentials rather than direct payment · downstream cost is corporate-account compromise: data exfiltration, ransomware, or wire-fraud authorization · per-incident cost to the company can reach $50K-$10M+.

The Numbers (and Where They Come From)

$1,225
Average per-victim loss to QR-code phishing in 2025 (CNBC analysis of FBI / FTC data)
✓ verified
FBI 2025
FBI public alert on unsolicited-package QR-code fraud (FBI 2025)
✓ verified
$390M+
FTC 2023 text-based fraud losses (which includes QR-code variants) — more than double the 2021 figure
✓ verified
IL · NJ · VA
States hit by major toll-text QR scam waves in June-July 2025; thousands of complaints to state DOTs
✓ verified

🆘 What to Do If You've Scanned a Malicious QR Code

💳 Card Issuer Fraud Line — Immediate

If you entered card details, dispute charges under FCBA (60 days) and call the issuer's fraud line. Block the card; have a new card issued.

🔐 Change Passwords + Enable MFA

If you entered login credentials, change the password immediately and enable two-factor authentication. Check the account for unauthorized activity.

🛡 Three-Bureau Fraud Alert

If you provided SSN or sensitive identifiers, place fraud alerts at Equifax, Experian, TransUnion. Consider a credit freeze.

📱 Mobile-Security Scan

Run a mobile-security scan, restart the device, remove unfamiliar apps. For high-stakes accounts, consider a factory reset.

📋 FTC ReportFraud

File at reportfraud.ftc.gov.

🏛 IC3 — If Loss Over $1,000

File at ic3.gov (FBI Internet Crime Complaint Center).

🏢 IT-Security Team (Corporate Quishing)

If workplace credentials were entered, notify IT-security through the established channel (not via the phishing email). They can rotate credentials and check for compromise.

📍 Report Tampered Physical QR

For parking-meter / restaurant / public QR sticker overlays, report to the city transportation authority, the restaurant manager, or the venue operator so they can remove the fraudulent sticker.

📖 Coming Soon · tabiji.ai General Scams
If you've ever scanned a parking-meter QR code on the fly, the full book covers 30+ scams across phone, text, online, and in-person channels — same federal-source-verified research as this guide.
$4.99 on Kindle when it ships · Notify me →
See current titles →

If You're Reporting Outside the United States

Frequently Asked Questions

What is a QR code scam?
A QR code scam (sometimes called "quishing") is fraud where a malicious QR code routes the scanner to a phishing website that captures payment info, login credentials, or installs malware. Per CNBC's 2025 reporting on FBI / FTC / state-agency data, average losses are about $1,225 per victim. The FBI issued a 2025 alert on unsolicited-package QR codes; the FTC warned in 2025 about parking-meter and restaurant-menu sticker overlays.
What's the single best defense?
Type the URL yourself rather than scanning a QR code from any unverified source. Real businesses and government agencies have published web addresses you can type directly. Bypassing the QR code costs twenty seconds and defeats every variant on this page.
How can I tell if a QR code has been tampered with?
Look for sticker overlay — a fresh sticker placed on top of a printed or molded QR code. Real parking-meter QR codes are usually printed directly onto the meter housing or under a clear protective laminate; if the QR code is on a peelable sticker, it has been added or modified.
What is the unsolicited-package QR code scam?
The FBI issued a 2025 alert documenting a variant where scammers ship unsolicited packages with a QR code attached. The QR code routes to a phishing site that asks for personal information; in some variants the QR code installs malware. Do not scan QR codes from any unsolicited package. Contact the carrier directly through their published number to verify before scanning anything.
What is the toll-text QR scam?
A wave of fake toll-payment text messages with QR codes hit drivers in Illinois, New Jersey, Virginia, and several other states in June-July 2025. Real state toll authorities mail unpaid-toll notices through USPS, never by text. Type the toll authority's published URL directly to check your balance.
What is restaurant-menu QR code fraud?
Scammers place fraudulent stickers on or near legitimate restaurant menu QR codes, routing diners to phishing sites that mimic the restaurant's ordering system and capture credit-card information. The protective rules: ask servers to confirm the menu URL, type the restaurant's URL directly, or pay at the counter.
What is corporate quishing?
Corporate quishing is the workplace variant: scammers send phishing emails containing QR codes that route to credential-harvesting sites mimicking Microsoft 365, Google Workspace, or the employer's SSO portal. The QR-code framing bypasses traditional email spam filters. Never scan QR codes in unsolicited work emails; verify with IT through the established helpdesk channel first.
I've already scanned a malicious QR code — what now?
Three layers. (1) If you entered payment information, dispute the charge with your card issuer under FCBA. (2) If you entered login credentials, change the password and enable MFA. (3) If you suspect malware, run a mobile-security scan. After triage: file at reportfraud.ftc.gov, ic3.gov for losses over $1,000, and your state attorney general.

Related Reading