Scenario:
Jonny Odermatt uses his phone for all his online activities. Not just the personal ones, but also for tasks at work. He has won several prizes in a variety of competitions, so he is always on the lookout for new opportunities whenever they arise.
Attack:
An attacker has picked Jonny as the target and is aware of his liking of competitions. So he stages a fake competition to seize control of Jonny’s telephone. To do this, he creates a forged invitation with a QR code that needs to be scanned using a smartphone: “Scan the QR code now to enter the draw for a trip round the world.” But the attacker has added malware to the QR code so that he can take control of Jonny’s phone as soon as the scan is complete.