Skip to main content

Tech Tip Tuesday (March 3, 2026)

🛡️ Safety Beyond the InboxInbox! 🛡️

Yes, we've had phishing. But what about second phishing?

 

While we’re all getting better at spotting "phishy"phishy" emails, scammers arehave movingmoved into the physical world. From QR codes to "lost" USB drives, they are finding new ways to bypass our digital filters.


Smishing:Smishing:
That urgent text about a "missed delivery" or a "payroll issue" is often a scam designed to steal your credentialspasswords on your mobile device.device -- or your BANK ACCOUNT INFO!

image.pngimage.png

Quishing (QR code Phishing)
Scammers place fake QR code stickers over real ones on posters, parking meters, or even menus to lead you to fake login pages. 
You wouldn't click on a phishing link in an email, right? So why "click" on one in real life?

image.pngimage.png


The

"Lost" USB
:
 
A "random" thumb drive left in the breakroom or parking lot isn't a lucky find—it’s a common way to sneak malware onto a school network.

 

 image.png

 


Meet "The DoppelgängerMimic" — Master of Physical Deception đźŽ­

The Mimic doesn't need to hack your firewall; they just need to hack your curiosity. By leaving a "lost" USB drive in the parking lot or a helpful-looking QR code sticker on a breakroom table, they wait for you to take the bait.

They rely on the fact that teachers and staff are naturally helpful. Once you plug in that mystery drive to "find the Artowner" ofor Socialscan Engineeringthat code to "see the staff discount," The Mimic bypasses district security and gains instant access to sensitive student or staff data.

Their Goal: To catch you off guard when you are away from your computer and feeling helpful, curious, or in a hurry.

 

The "Mimic" 3-Second Safety Check 🛑

MeetBefore you scan or plug anything in, run through these three quick questions to see if The Doppelgänger!Mimic Thisis trying to hook you:

support—anything to make you act fast and skip thinking.

1. Is it a "Layer"? Look closely at the QR code. Is it printed directly on the poster, or is it a sticker slapped over the original? If it feels like a "top layer," do not scan it.
2. Does the "Preview" match? When you hover your camera over a QR code, your phone shows a URL preview. If the link is a cyberbunch tricksterof whorandom doesn’t hack computers. He hacks people. Through emails, texts, phone calls,gibberish or evena face-to-face"shortener" conversations,(like socialbit.ly engineersor usetiny.cc) trust,when fear,it andshould urgencybe a school website, close the app.
3. Is it "Unattended"? A USB drive sitting on a cafeteria table or a QR code on a random telephone pole is a red flag. If it’s not physically attached to trick you into giving up passwords, clicking links, or letting them in the door.

They might impersonate a coworker,trusted asource, vendor,leave orit evenalone.

IT

image.png

HowContext tois Outsmart the Doppelgänger
Everything

    Ask

  • 🛑 Stop, Look, Thinkyourself: beforeDoes respondingit make sense for this to anybe unexpecteda messageQR code?

     

     

    * The Red Flag * 

    A random flyer on a telephone pole or visitor.

    a
  • "Free
  • Gift
    📞Card" Verifysticker requests usingon a knownbreakroom contacttable methodis —almost don’tcertainly replya directlytrap.

    to

     suspicious

    emails.

    The

  • Rule:
  • đź”’

    Only Neverscan sharecodes passwordsfrom trusted, official sources (like the back of your staff ID or MFAa codes.permanent ITschool will never ask for them.

  • đźš· Report anything suspicious to IT or your site tech team immediately.
sign).

thumb-a49d786c3702b02af052f7f4feecf8e2.png

Blaze King

Director of Information Technology

Email: bking@ulusd.org
Website: ulusd.org
Location: 750 Old Lucerne Road, Upper Lake, CA, USA
Phone: 707-275-9139