{"id":19785,"date":"2022-06-29T16:00:54","date_gmt":"2022-06-29T12:00:54","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/19785\/"},"modified":"2022-06-29T16:01:15","modified_gmt":"2022-06-29T12:01:15","slug":"dhl-scam-with-qr-codes","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/19785\/","title":{"rendered":"&#8220;Package for you. Please scan the QR code&#8221;"},"content":{"rendered":"<p>Online shopping is now an established part of daily life: we get food, clothes and other goods delivered to our door in a couple of clicks. Online shopaholics, of which there are many, are may sometimes forget about a parcel or miss a call from the courier. Unsurprisingly, this is exploited by attackers who use fake delivery notifications as bait.<\/p>\n<p>One example of this is cybercriminals pretending to be the international express courier service, DHL. However, instead of the usual phishing link, it\u2019s a QR code that\u2019s contained in the e-mail received that kicks off this kind of swindle. How and why is the topic of this post.<\/p>\n<h2>\u201cYour package is at the post office\u201d<\/h2>\n<p>\nAn attack begins with an e-mail, seemingly from DHL. Although the sender\u2019s address is a random set of words bearing no resemblance to the courier service\u2019s name, the message body is quite convincing: company logo, order number (albeit fake), and supposed date of receipt of a package.<\/p>\n<p>The message itself (in this case in Spanish) states that an order has arrived at a local post office, but the courier was unable to deliver it in person. Usually such bait is accompanied by a link to \u201cresolve the issue,\u201d but this time there\u2019s a QR code instead.<\/p>\n<div id=\"attachment_44746\" style=\"width: 1110px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/06\/29160101\/dhl-scam-with-qr-codes-screen-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44746\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/06\/29160101\/dhl-scam-with-qr-codes-screen-1.jpg\" alt=\"E-mail with QR code supposedly from DHL. For safety, we replaced the QR code in the screenshot with a harmless one\" width=\"1100\" height=\"1100\" class=\"size-full wp-image-44746\"><\/a><p id=\"caption-attachment-44746\" class=\"wp-caption-text\">E-mail with QR code supposedly from DHL. For safety, we replaced the QR code in the screenshot with a harmless one<\/p><\/div>\n<p>A QR code is quite a versatile thing. It can be used, for example, to connect to Wi-Fi, pay for a purchase, or confirm you\u2019ve bought a ticket to a concert or movie. But perhaps their most common use is to distribute links offline: scanning a black-and-white square that can appear on product packaging, advertising posters, business cards, or elsewhere is a quick route to the relevant website.<\/p>\n<p>In this case, of course, the attackers were not thinking about user convenience. The idea seems to be that if the victim initially opens the e-mail on a computer, they\u2019ll still have to read the QR code with a smartphone, which means that the malicious site will open on the small screen of a mobile, where signs of phishing are harder to spot. Due to the space constraints in mobile browsers, URLs are not fully visible. And in Safari, the address bar was recently moved to the bottom of the screen, where many users don\u2019t even look. This plays straight into the hands of the cybercriminals because the URL of their fake site looks nothing like the official one: the word DHL doesn\u2019t even make an appearance.<\/p>\n<p>The website text is also small, which means that any design flaws are less noticeable. In any case, there aren\u2019t that many of them: the page welcomes users with the trademark yellow and red colors, the company name is shown below, and the text is pretty much error-free save for a couple of lowercase letters at the beginning of sentences.<\/p>\n<p>The victim is informed that the package will arrive within 1?2 days; to receive it, they\u2019re prompted to enter their first name, surname, and address with zip code. The delivery service does indeed request such kind of information, so no suspicions are aroused.<\/p>\n<div id=\"attachment_44745\" style=\"width: 1810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/06\/29160107\/dhl-scam-with-qr-codes-screen-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44745\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/06\/29160107\/dhl-scam-with-qr-codes-screen-2.jpg\" alt=\"Fake DHL site asks for personal information, plus bank card details\" width=\"1800\" height=\"1280\" class=\"size-full wp-image-44745\"><\/a><p id=\"caption-attachment-44745\" class=\"wp-caption-text\">Fake DHL site asks for personal information, plus bank card details<\/p><\/div>\n<p>But the data harvesting doesn\u2019t end there. On the next page, the victim is asked to share more sensitive information: bank card details, including the CVV code on the back ? purportedly to pay for delivery. The attackers don\u2019t specify an amount, mentioning only that the cost depends on the region, and giving assurances that money won\u2019t be debited until the package arrives. In actual fact, the genuine DHL requires payment for delivery in advance, when the order is made. If a customer does indeed miss the courier, another delivery attempt is made for free.<\/p>\n<h2>What do the criminals do with your payment data?<\/h2>\n<p>\nIt\u2019s unlikely the criminals will start charging the victim\u2019s card immediately ? so that the latter doesn\u2019t link the debits to the bogus \u201cDHL\u201d e-mail. They\u2019re more likely to sell the payment data on the dark web, and it will be the buyer there who later siphons the funds instead\u00a0? when the victim may have already forgotten about the non-existent package.<\/p>\n<h2>How to protect yourself<\/h2>\n<p>\nAll the usual rules for protecting against cyberfraud apply in this case:<\/p>\n<ul>\n<li>Upon receipt of an e-mail claiming to be from a well-known service, always check the sender\u2019s e-mail address. The real name of the company doesn\u2019t appear after the @? It\u2019s most likely a scam. For other recognizable signs, see our <a href=\"https:\/\/www.kaspersky.com\/blog\/online-scam-red-flags\/43212\/\" target=\"_blank\" rel=\"noopener nofollow\">separate post<\/a>.<\/li>\n<li>If you\u2019re expecting a package, be sure to make a note of the tracking code and check its status on the official website yourself by opening it from Favorites or entering the URL in a search engine manually.<\/li>\n<li>To be on the safe side, when scanning QR codes, use our Kaspersky QR Scanner (available for both <a href=\"https:\/\/app.appsflyer.com\/com.kaspersky.qrscanner?pid=smm&amp;c=me-en_kdailyplaceholder\" target=\"_blank\" rel=\"noopener nofollow\">Android<\/a> and <a href=\"https:\/\/app.appsflyer.com\/id948297363?pid=smm&amp;c=me-en_kdailyplaceholder\" target=\"_blank\" rel=\"noopener nofollow\">iOS<\/a>). The app will tell you if the code points to a dangerous site.<\/li>\n<li>Equip all devices with a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">reliable antivirus<\/a> with anti-phishing and anti-fraud protection, which will warn you of any danger in good time.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>How cybercriminals extract bank card details pretending to be DHL.<\/p>\n","protected":false},"author":2598,"featured_media":19789,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2088,80,1220,695],"class_list":{"0":"post-19785","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-tips","9":"tag-fraud","10":"tag-qr-codes","11":"tag-scam"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/19785\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dhl-scam-with-qr-codes\/24318\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/9983\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/26681\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dhl-scam-with-qr-codes\/24619\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/24995\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dhl-scam-with-qr-codes\/27346\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dhl-scam-with-qr-codes\/26943\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dhl-scam-with-qr-codes\/33400\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dhl-scam-with-qr-codes\/10814\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dhl-scam-with-qr-codes\/44744\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dhl-scam-with-qr-codes\/19105\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dhl-scam-with-qr-codes\/19659\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dhl-scam-with-qr-codes\/28954\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dhl-scam-with-qr-codes\/32580\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/dhl-scam-with-qr-codes\/28343\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/dhl-scam-with-qr-codes\/25169\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dhl-scam-with-qr-codes\/30682\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dhl-scam-with-qr-codes\/30431\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19785"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19785\/revisions"}],"predecessor-version":[{"id":19788,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19785\/revisions\/19788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19789"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}