The government of Houston, Texas, warns its citizens about a new variant of fraud in which threat actors place fraudulent QR codes on the parking meters of some streets in order to take users to fraudulent websites where their confidential information could be stolen.
🚨Scam Alert🚨
APD Financial Crimes detectives are investigating after fraudulent QR code stickers were discovered on City of Austin public parking meters. People attempting to pay for parking using those QR codes may have been directed to a fraudulent website and made a payment.
As you may recall, a QR (Quick Response) code is a two-dimensional barcode that, when scanned with a mobile device, can almost instantly link the user to a website, information platform, and other sets of information without having to enter through the browser. In the midst of the COVID-19 health crisis, these codes have once again been used massively in shopping malls, restaurants, and public transport and government offices to limit contact between people to the minimum possible.
Over the past week alone, authorities found five payment stations with these fraudulent QR codes, most in the city center. These codes are carefully placed on the machines, although they must be in sight so that potential victims can scan them.
By scanning one of these codes, users will be redirected to a website like the one shown below:
The authorities recommend that citizens refrain from scanning any QR code they find on the street, since the city does not accept any payment through these codes. Houston will continue to monitor payment stations in the search for more malicious QR codes.
It should be remembered that, at the moment, Houston only accepts four means of payment for parking meters in the city: coins, banknotes, credit card and the ParkHouston mobile app. The local government also asked citizens to report any suspicious activity near these payment stations, either through the 911 emergency numbers or through ParkHouston’s official platforms.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.


You May Also Like

Founder of DeFiance crypto exchange hacked; $16 million USD stolen via mobile wallet. No one is safe

A recent cybersecurity report assures that Arthur_0x, founder of the cryptocurrency investment…

Major Russian cyberattack globally halted by intelligence agencies in the Netherlands

Thousands of routers owned by small businesses and homes in the Netherlands…