Quishing Absa | Corporate and Investment Banking > Insights and Events > Quishing SHARE QR phishing, also known as "Quishing," is an increasingly common tactic in the digital world. Fraudulent QR codes are embedded in emails, posters, or public spaces and, when scanned, direct users to malicious websites or harmful content designed to steal sensitive information. How it happens and red flags to look out for Fraudsters change legitimate QR codes to redirect you to a fraudulent website which might require you to provide your login credentials or making unintended payments. Never enter passwords, banking details, or personal information on websites opened through QR codes unless you’re sure of the site’s authenticity.. How to respond and protect yourself or organisation Avoid scanning QR codes from unknown or untrusted source Before entering any information, carefully check the website address (URL) to ensure it's legitimate. Reporting options To report fraud-related incidents, please email cibfraud@absa.africa To report phishing incidents, please email secmon@absa.co.za To report a matter after business hours, please contact our Fraud Hotline on 0860 500 703 or 010 211 3117. https://cib.absa.africa/wp-content/uploads/2020/07/file_example_MP3_700KB.mp3 Related Articles FRAUD Fraud Alert Fraud is more than just a crime—it’s a global threat that silently drains billions from economies, shatters businesses, and ruins lives. From Social engineering, Cyber scams and identity theft to corporate deception, embezzlement and financial misstatements, fraud erodes trust in systems we rely on daily. Read more FRAUD Spyware Spyware involves the use of malicious software to covertly infiltrate computers or networks with the intent of collecting sensitive information. The information collected can then be used by fraudsters to commit fraud, including unauthorised access to bank accounts, theft of corporate data, and manipulation of financial transactions. Read more FRAUD Keylogger Keyloggers are programs that record everything you type, including passwords, emails, and credit card numbers. Installed via Trojans or malicious downloads. Read more