{"id":4216,"date":"2023-10-04T15:12:47","date_gmt":"2023-10-04T13:12:47","guid":{"rendered":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=4216"},"modified":"2023-10-04T15:12:49","modified_gmt":"2023-10-04T13:12:49","slug":"qrishing-la-estafa-detras-del-codigo-qr","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr","title":{"rendered":"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\u00a0"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">Seguro que has le\u00eddo multitud de <a href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/para-que-sirve-un-codigo-qr\/\" target=\"_blank\" rel=\"noopener\"><strong>c\u00f3digos QR<\/strong><\/a> a lo largo de los \u00faltimos a\u00f1os. Puede que hayas necesitado leer un c\u00f3digo con tu m\u00f3vil en un restaurante, en el cine, en un supermercado o en una tienda de ropa. Desde que superamos la pandemia, estos cuadraditos llenos de puntos han elevado su popularidad.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En gran parte, <strong>el uso de los c\u00f3digos QR ha aumentado por las restricciones pospandemia<\/strong>, ya que necesit\u00e1bamos mantener una distancia prudente para no contagiarnos. Sin embargo, estos c\u00f3digos llevan con nosotros desde 1994. Llegaron a estar por todas partes, pero la gente no ve\u00eda la necesidad de usarlos.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00bfY qu\u00e9 pasa con los hackers? Que ven una oportunidad \u00fanica de estafar a un gran n\u00famero de personas. B\u00e1sicamente, lo que hacen es camuflar estos c\u00f3digos QR en sitios de confianza para un usuario y <strong>llevarlo a una p\u00e1gina fraudulenta d\u00f3nde robar sus datos.<\/strong> En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo estas estafas y c\u00f3mo puedes <a href=\"https:\/\/www.inesem.es\/Curso-Ciberseguridad-Big-Data\" target=\"_blank\" rel=\"noopener\">aumentar tus conocimientos en ciberseguridad con la formaci\u00f3n correcta.<\/a><\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_72 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\/#Cuidado_al_abrir_un_codigo_QR\" title=\"Cuidado al abrir un c\u00f3digo QR\u00a0\">Cuidado al abrir un c\u00f3digo QR\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\/#Casos_de_estafas_usando_los_codigos_QR\" title=\"Casos de estafas usando los c\u00f3digos QR\u00a0\">Casos de estafas usando los c\u00f3digos QR\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\/#Practicas_para_no_caer_en_el_Qrishing\" title=\"Pr\u00e1cticas para no caer en el Qrishing\u00a0\">Pr\u00e1cticas para no caer en el Qrishing\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\/#%C2%BFComo_actuar_si_ya_has_sufrido_un_ataque_de_Qrishing\" title=\"\u00bfC\u00f3mo actuar si ya has sufrido un ataque de Qrishing?\u00a0\">\u00bfC\u00f3mo actuar si ya has sufrido un ataque de Qrishing?\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Cuidado_al_abrir_un_codigo_QR\"><\/span><b><span data-contrast=\"auto\">Cuidado al abrir un c\u00f3digo QR<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Como venimos diciendo, el caso m\u00e1s extendido de estafa con los c\u00f3digos QR consiste en<strong> enlazar a una p\u00e1gina externa.<\/strong> En dicha p\u00e1gina, te pueden ofrecer la descarga de una app de confianza, que ya conoces. La interfaz de la web es pr\u00e1cticamente igual que la oficial, sin embargo, se te descarga un archivo malicioso que infecta tu tel\u00e9fono m\u00f3vil.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Al descargarte este archivo, est\u00e1s <strong>descargando directamente un malware en tu m\u00f3vil.<\/strong> Podr\u00e1n acceder a todos tus datos de manera sencilla, adem\u00e1s de tener un conocimiento de toda actividad. Por ello, es muy importante que tengas mucho cuidado con los QR que te dan acceso directo a una aplicaci\u00f3n. No te f\u00edes y nunca te descargues algo de un sitio web en el que no conf\u00edas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En otras ocasiones nos encontramos con <strong>c\u00f3digos QR que te llevan a una plataforma de pago.<\/strong> Todo parece normal, ya que incluyen servicios conocidos como VISA o Paypal. Sin embargo, estar\u00edas pagando o enviando dinero a unos hackers. Por ello, no descargues nada ni des tus datos personales a trav\u00e9s de un c\u00f3digo QR. Aseg\u00farate siempre.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Casos_de_estafas_usando_los_codigos_QR\"><\/span><b><span data-contrast=\"auto\">Casos de estafas usando los c\u00f3digos QR<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">\u00bfExisten ya algunos casos de <strong>estafa a trav\u00e9s de los QR<\/strong>? Por desgracia, s\u00ed. Uno de los casos m\u00e1s sonados fue tras el \u00e9xito de la serie \u2018El Juego del Calamar\u2019, ya que se empezaron a repartir tarjetas con la simbolog\u00eda de la serie, con un QR. \u00bfQu\u00e9 pasaba? Que te llevaba a una p\u00e1gina web de escasa confianza.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Otro de los casos m\u00e1s populares lo tenemos con <strong>Discord.<\/strong> B\u00e1sicamente, a trav\u00e9s de un c\u00f3digo QR puedes acceder a un servidor de Discord. Pero, claro, muchos hackers decidieron alterar algunos de estos c\u00f3digos QR para robarte la cuenta y enviar ese mismo c\u00f3digo a toda tu lista de contactos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">El \u00faltimo de los ejemplos que hemos seleccionado se encuentra en<strong> los parqu\u00edmetros.<\/strong> Y es que a principios de 2022 se empezaron a colocar por las calles, robando directamente el dinero de las v\u00edctimas. \u00bfC\u00f3mo le robaban el dinero? Porque se vend\u00edan c\u00f3mo una manera de pagar el estacionamiento r\u00e1pidamente.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Practicas_para_no_caer_en_el_Qrishing\"><\/span><b><span data-contrast=\"auto\">Pr\u00e1cticas para no caer en el Qrishing<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">En INESEM, queremos transmitirte una serie de<strong> consejos para que no seas hackeado a trav\u00e9s del Qrishing.<\/strong> Lo primero que debes tener en cuenta es que \u00fanicamente deb\u00e9is acceder a c\u00f3digos QR de confianza, de sitios en donde est\u00e9s acostumbrado a eso. Aun as\u00ed, existen ciertas comprobaciones que debes hacer. Vamos a ver esos consejos:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">No descargues ninguna app que venga de un c\u00f3digo QR. A no ser que te redirija a Play Store o Apple Store, no te la descargues.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Si te encuentras un QR en la calle, ten mucho cuidado y extrema la precauci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Si el QR est\u00e1 situado en un lugar de confianza como la carta de un restaurante, una buena forma de asegurarte es comprobando que no se trata de una pegatina que se sobrepone al aut\u00e9ntico.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Tambi\u00e9n puedes analizar la url a la que te lleva con herramientas Sucuri, PCrisk o VirusTotal.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">No introduzcas ning\u00fan dato personal que te pueda exponer.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Tampoco realices pagos en ninguna plataforma a la que hayas accedido a trav\u00e9s de un c\u00f3digo QR.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"%C2%BFComo_actuar_si_ya_has_sufrido_un_ataque_de_Qrishing\"><\/span><b><span data-contrast=\"auto\">\u00bfC\u00f3mo actuar si ya has sufrido un ataque de Qrishing?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Cuando te enfrentas a un <strong>ataque de Qrishing<\/strong>, es esencial tomar medidas inmediatas para proteger tus datos y tu seguridad en l\u00ednea. Aqu\u00ed hay una gu\u00eda concisa sobre c\u00f3mo actuar:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Elimina el c\u00f3digo QR sospechoso:<\/strong> Si has escaneado un c\u00f3digo QR que parece sospechoso o proviene de una fuente desconocida, elim\u00ednalo inmediatamente de tu dispositivo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Descon\u00e9ctate de la red:<\/strong> Si el ataque de Qrishing involucra una red wifi falsa, descon\u00e9ctate de ella de inmediato para evitar que los atacantes accedan a tu informaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Cambia tus contrase\u00f1as:<\/strong> Cambia todas tus contrase\u00f1as importantes, especialmente aquellas relacionadas con cuentas financieras o sensibles. Utiliza contrase\u00f1as fuertes y \u00fanicas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"10\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Escanea tu dispositivo en busca de malware:<\/strong> Ejecuta un escaneo de seguridad en tu dispositivo para detectar y eliminar cualquier malware que pueda haberse instalado como resultado del ataque.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"11\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Monitorea tus cuentas y tarjetas bancarias:<\/strong> Vigila tus cuentas bancarias y tarjetas de cr\u00e9dito en busca de actividad no autorizada. Notifica a tu banco de inmediato si detectas transacciones sospechosas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"12\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Reporta el ataque:<\/strong> Denuncia el ataque de Qrishing a las autoridades locales y al proveedor de la aplicaci\u00f3n o dispositivo que empleaste para escanear el c\u00f3digo QR.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"13\" data-aria-level=\"1\"><span data-contrast=\"auto\"><strong>Mant\u00e9n tu software actualizado:<\/strong> Aseg\u00farate de que tu sistema operativo y todas las aplicaciones est\u00e9n actualizadas con los \u00faltimos parches de seguridad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">En resumen, la rapidez en la acci\u00f3n es esencial cuando sufres un <strong>ataque de Qrishing.<\/strong> Elimina la amenaza, protege tus contrase\u00f1as, escanea tu dispositivo y mant\u00e9n un ojo en tus cuentas financieras. Al tomar estas medidas, puedes minimizar el da\u00f1o y restaurar tu seguridad en l\u00ednea.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.<\/p>\n","protected":false},"author":91904,"featured_media":4217,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"class_list":["post-4216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-redes-sistemas-y-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Qrishing: la estafa detr\u00e1s del c\u00f3digo QR<\/title>\n<meta name=\"description\" content=\"En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\" \/>\n<meta property=\"og:description\" content=\"En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-04T13:12:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-04T13:12:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1620\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Antonio Guti\u00e9rrez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Antonio Guti\u00e9rrez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\"},\"author\":{\"name\":\"Antonio Guti\u00e9rrez\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/15e0f78aeca201ea816d1b2047735db0\"},\"headline\":\"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\u00a0\",\"datePublished\":\"2023-10-04T13:12:47+00:00\",\"dateModified\":\"2023-10-04T13:12:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\"},\"wordCount\":1073,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg\",\"articleSection\":[\"Redes, Sistemas y Seguridad\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\",\"name\":\"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg\",\"datePublished\":\"2023-10-04T13:12:47+00:00\",\"dateModified\":\"2023-10-04T13:12:49+00:00\",\"description\":\"En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg\",\"width\":1620,\"height\":1080,\"caption\":\"Qrishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Redes, Sistemas y Seguridad\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/15e0f78aeca201ea816d1b2047735db0\",\"name\":\"Antonio Guti\u00e9rrez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/gestion-integrada\/files\/2023\/01\/cropped-Diseno-sin-titulo-2-96x96.png\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/gestion-integrada\/files\/2023\/01\/cropped-Diseno-sin-titulo-2-96x96.png\",\"caption\":\"Antonio Guti\u00e9rrez\"},\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/antonio-gutierrez\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR","description":"En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr","og_locale":"es_ES","og_type":"article","og_title":"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR","og_description":"En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2023-10-04T13:12:47+00:00","article_modified_time":"2023-10-04T13:12:49+00:00","og_image":[{"width":1620,"height":1080,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg","type":"image\/jpeg"}],"author":"Antonio Guti\u00e9rrez","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Antonio Guti\u00e9rrez","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr"},"author":{"name":"Antonio Guti\u00e9rrez","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/15e0f78aeca201ea816d1b2047735db0"},"headline":"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\u00a0","datePublished":"2023-10-04T13:12:47+00:00","dateModified":"2023-10-04T13:12:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr"},"wordCount":1073,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg","articleSection":["Redes, Sistemas y Seguridad"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr","name":"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg","datePublished":"2023-10-04T13:12:47+00:00","dateModified":"2023-10-04T13:12:49+00:00","description":"En este post vamos a analizar en profundidad c\u00f3mo llevan a cabo las estafas de Qrishing. Adem\u00e1s, te daremos algunos consejos \u00fatiles.","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg","width":1620,"height":1080,"caption":"Qrishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/qrishing-la-estafa-detras-del-codigo-qr#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Redes, Sistemas y Seguridad","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad"},{"@type":"ListItem","position":3,"name":"Qrishing: la estafa detr\u00e1s del c\u00f3digo QR\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/15e0f78aeca201ea816d1b2047735db0","name":"Antonio Guti\u00e9rrez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/gestion-integrada\/files\/2023\/01\/cropped-Diseno-sin-titulo-2-96x96.png","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/gestion-integrada\/files\/2023\/01\/cropped-Diseno-sin-titulo-2-96x96.png","caption":"Antonio Guti\u00e9rrez"},"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/antonio-gutierrez"}]}},"autor_name":{"name":"Antonio Guti\u00e9rrez"},"featured_image":{"attachment_meta":{"width":1620,"height":1080,"file":"2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925.jpg","sizes":{"medium":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-175x117.jpg","width":175,"height":117,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-175x117.jpg"},"large":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-1020x680.jpg","width":1020,"height":680,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-1020x680.jpg"},"thumbnail":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-345x180.jpg","width":345,"height":180,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-345x180.jpg"},"medium_large":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-768x512.jpg","width":768,"height":512,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-768x512.jpg"},"wysija-newsletters-max":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-600x400.jpg","width":600,"height":400,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-600x400.jpg"},"1536x1536":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-1536x1024.jpg","width":1536,"height":1024,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-1536x1024.jpg"},"thumb-small":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-80x80.jpg","width":80,"height":80,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-80x80.jpg"},"thumb-standard":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-320x320.jpg","width":320,"height":320,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-320x320.jpg"},"thumb-medium":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-520x245.jpg","width":520,"height":245,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-520x245.jpg"},"thumb-large":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-720x340.jpg","width":720,"height":340,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-720x340.jpg"},"thumb-anteriores":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-230x163.jpg","width":230,"height":163,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-230x163.jpg"},"thumb-inverso":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-369x261.jpg","width":369,"height":261,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-369x261.jpg"},"thumb-cercano":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-650x200.jpg","width":650,"height":200,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-650x200.jpg"},"thumb-slider":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-574x430.jpg","width":574,"height":430,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-574x430.jpg"},"thumb-busqueda":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-580x375.jpg","width":580,"height":375,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-580x375.jpg"},"thumb-formacion-continua":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-440x336.jpg","width":440,"height":336,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-440x336.jpg"},"thumb-xlarge":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-980x450.jpg","width":980,"height":450,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-980x450.jpg"},"thumb-xxlarge":{"file":"Diseno-sin-titulo-2023-10-04T151047.925-1320x500.jpg","width":1320,"height":500,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/10\/Diseno-sin-titulo-2023-10-04T151047.925-1320x500.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"1","keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4216"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/91904"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=4216"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4216\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/4217"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=4216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=4216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}