logo
Receive a random package you didn't order? You may be a victim of a ‘brushing' scheme — here's how it works

Receive a random package you didn't order? You may be a victim of a ‘brushing' scheme — here's how it works

Yahoo20-05-2025

Ray Simmons was baffled when an Amazon package containing beet chews landed on his doorstep.
'I did think that maybe someone in my family was playing a joke on me, that they were telling me that I needed to eat healthier,' Simmons shared with WSB-TV Atlanta.
Thanks to Jeff Bezos, you can now become a landlord for as little as $100 — and no, you don't have to deal with tenants or fix freezers. Here's how
I'm 49 years old and have nothing saved for retirement — what should I do? Don't panic. Here are 5 of the easiest ways you can catch up (and fast)
Nervous about the stock market in 2025? Find out how you can access this $1B private real estate fund (with as little as $10)
But the package wasn't a joke. Simmons, as he would come to learn, had unwillingly become the target of a scam known as 'brushing.' The scheme is reportedly designed to exploit consumer data and manipulate online product reviews, the U.S. Postal Inspection Service (USPIS) reports.
And while that may seem fairly harmless, USPIS has issued a warning to Americans across the country: if you receive a package that you didn't order, do not scan any QR codes that come with it.
The brushing scam involves third-party sellers on e-commerce platforms that send unsolicited, low-value items to random people whose names and addresses were found online.
Once the item is shipped, the scammers leave fake five-star reviews online using the recipient's name, or a fake profile made to resemble the recipient. The goal is to make the seller's products appear popular and highly rated in order to gain more visibility and sales.
'They didn't order anything, they received it, and it's generally a household item, a low-value item,' said U.S. Postal Inspector David Gealey. 'They have your personal information, which is easy to get because they can just Google a name and address. It's out there on the web, right?'
Although the brushing scam might not directly lead to a financial loss, it signals that your personal information — such as your name and address — is being used without your knowledge. And that personal information could be circulating on unsecured databases or among bad actors online.
All of this would be cause for concern, but the dangers of this scam can become a lot more severe if the target does not exercise caution.
Read more: You're probably already overpaying for this 1 'must-have' expense — and thanks to Trump's tariffs, your monthly bill could soar even higher. Here's how 2 minutes can protect your wallet right now
Postal inspectors say the real danger comes when these packages include a QR code, which urges recipients to scan for more information or to confirm the delivery. These codes can lead to malicious websites that steal personal data, install malware or phish for sensitive information.
'We do caution customers: do not scan any QR code on the package because sometimes that QR code can lead to a malicious site,' Gealey warned.
Fortunately, Simmons' package did not contain a QR code. However, he still took a few necessary steps to protect himself and ensure his Amazon and banking accounts hadn't been compromised.
Receiving an unexpected package could indicate that your personal information is being misused. Here's what USPIS recommends.
Do not scan QR codes: As we discussed above, scanning QR codes from unreliable sources can bring on a heap of trouble that could lead to stolen personal data or harmful malware installed on your device(s).
Do not return the item: You are not legally obligated to return unsolicited items. Simply keeping or discarding the package is safe, but don't follow any instructions that came with it.
Check your financial accounts: Review your online bank and credit card statements, as well as your online shopping profiles and Amazon account activity immediately to ensure that your accounts haven't been hacked.
Report the package: Notify your local police department, USPIS and/or the Federal Trade Commission about the unsolicited package. Reporting the package can help authorities with their investigation and can potentially prevent others from becoming a victim.
Want an extra $1,300,000 when you retire? Dave Ramsey says this 7-step plan 'works every single time' to kill debt, get rich in America — and that 'anyone' can do it
Rich, young Americans are ditching the stormy stock market — here are the alternative assets they're banking on instead
Robert Kiyosaki warns of a 'Greater Depression' coming to the US — with millions of Americans going poor. But he says these 2 'easy-money' assets will bring in 'great wealth'. How to get in now
Here are 5 'must have' items that Americans (almost) always overpay for — and very quickly regret. How many are hurting you?
This article provides information only and should not be construed as advice. It is provided without warranty of any kind.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Gainesville Fire Department to stage fake fire during training exercise on Monday
Gainesville Fire Department to stage fake fire during training exercise on Monday

Yahoo

time41 minutes ago

  • Yahoo

Gainesville Fire Department to stage fake fire during training exercise on Monday

Gainesville residents may notice emergency vehicles and what appears to be smoke near the downtown area on Monday, but don't fret. It's just a training exercise. The Gainesville Fire Department will conduct field training on Monday from 8 a.m. to 5 p.m. They will simulate a commercial fire near downtown Gainesville. The department says the smoke will be artificial, and there will be no fire present. They ask that you do not call 911 regarding this incident. A single lane of College Avenue may be closed during the planned time period. [DOWNLOAD: Free WSB-TV News app for alerts as news breaks] TRENDING STORIES: Atlanta-area rapper sentenced for bringing stolen loaded 'machine gun' into hospital labor unit 38-year-old GA man charged with grooming a minor Stolen vehicle leads to police chase along I-20 [SIGN UP: WSB-TV Daily Headlines Newsletter]

Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'
Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'

Boston Globe

time2 hours ago

  • Boston Globe

Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'

Foreign hackers have increasingly identified smartphones, other mobile devices, and the apps they use as a weak link in US cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. Advertisement 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity specialist at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real-time and able to read text messages,' said Representative Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Advertisement Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' US Representative John Moolenaar, Republican of Michigan and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their US operations. Advertisement Mobile devices can buy stocks, launch drones, and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords, and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators, and business leaders with texts and phone calls. It's unclear how the person obtained Wiles's connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles's number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information, or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Advertisement Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. 'We just can't share things willy-nilly.'

Man dies after tree falls on top of car in northeast GA
Man dies after tree falls on top of car in northeast GA

Yahoo

time3 hours ago

  • Yahoo

Man dies after tree falls on top of car in northeast GA

The Georgia State Patrol has identified a man who was killed in a car wreck over the weekend. [DOWNLOAD: Free WSB-TV News app for alerts as news breaks] On Saturday, around 6:48 p.m., GSP was called to the area of State Route 51 near Garrison Road in Banks County. When troopers arrived, they learned that Jason Keith Payne, 56, of Carnesville, was driving a 2000 Nissan Altima. Officials said that while Payne was traveling eastbound, a tree on the south side of State Route 51 fell across the road, hitting the top of the car. Payne was pronounced dead at the scene. According to GEMA, the 56-year-old is believed to have been killed when a line of storms moved through metro Atlanta on Saturday, bringing damaging winds and heavy rain. Gov. Brian Kemp shared his condolences in a post on X. TRENDING STORIES: Atlanta-area rapper sentenced for bringing stolen loaded 'machine gun' into hospital labor unit A runaway pet zebra has been captured in Tennessee 38-year-old GA man charged with grooming a minor [SIGN UP: WSB-TV Daily Headlines Newsletter]

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store