Merchants and cafes
Use this checklist for countertop stands, cashier displays, menus, and printed signage that ask a customer to scan and pay.
QR payment safety
Use this anti-quishing checklist to spot tampered payment QR codes, verify recipients, and give customers a safer way to scan.
Use this checklist for countertop stands, cashier displays, menus, and printed signage that ask a customer to scan and pay.
Use it for invoices, billing reminders, branch materials, and any distributed print that can drift or be tampered with over time.
Use it when a QR arrives through an unexpected message, a questionable invoice attachment, or a physical sign that looks altered.
Check the receiver name, merchant identity, or handle in the official app before confirming.
Look for sticker overlays, tampering, or mismatched branding on printed QR displays.
Do not trust urgency alone. Pause if the QR arrived through an unexpected attachment or message.
Re-scan your own printed payment signs regularly so you can spot changes early.
If a payment flow feels wrong, fall back to the bank or wallet app manually.
Keep a visible fallback URL or staff-assisted option so scanning is never the only path.
Verify the destination, payee details, and fallback URL. Scan the draft on real phones before you commit to a production run.
Place the QR where staff can inspect it, keep tamper-evident materials in mind, and leave room for a visible safety reminder or fallback path.
Re-scan live signs, check for overlays or wear, and confirm the receiver details still match what customers expect to see.
Compare payment rails, official references, and rollout patterns before you print.
Separate actual scan failures from destination issues and weak print quality.
Review broader scam patterns and trust cues beyond payment-specific flows.
Safety FAQ
Yes. Sticker-over-sticker replacement is a common scam pattern, which is why physical verification matters for payment displays.
Only after verifying the sender and receiver details independently. Unexpected invoice or chat QR codes deserve extra caution.
No. Static prompts can still be tampered with or misread, which is why official-app confirmation and periodic self-checks matter.
Quishing is phishing that uses QR codes as the delivery mechanism. The scam may appear on a sticker, invoice, email, poster, or chat message, but the goal is still to push you toward a malicious or misleading destination.
Yes. A visible URL, verified handle, or staff-assisted payment option reduces pressure on the customer and gives them a safer path when a scan looks suspicious.