introduzione

Negli ultimi anni, i criminali informatici sono diventati sempre più sofisticati nei loro tentativi di ingannare individui ignari attraverso truffe via email. One prevalent example is the fake USPS “Your Package Is Waiting For Delivery” email. This article aims to educate readers on how to identify and avoid falling victim to these scams. By understanding the red flags and taking necessary precautions, individuals can protect themselves from privacy breaches, perdite finanziarie, e furto d'identità.

The Anatomy of a Fake USPS Email

Subject Line and Content

The subject line of a fake USPS email will typically grab the recipient’s attention by mentioning an impending package delivery. Per esempio, it may read “USPS Notice: Your Consignment Is Pending.” The email’s content will claim that a package is waiting for delivery, but there is an outstanding fee of $1.99 that must be paid before shipment. The scammers create a sense of urgency by stating that the payment must be made within a specific timeframe, usually two days.

In questo articolo abbiamo cercato di descrivere tutti i modi principali per risolvere il problema:

Prova SpyHunter

SpyHunter è un potente strumento in grado di mantenere pulito il tuo Windows. Cercherà ed eliminerà automaticamente tutti gli elementi relativi al malware. Non è solo il modo più semplice per eliminare il malware, ma anche il più sicuro e sicuro. La versione completa di SpyHunter costa $42 (si ottiene 6 mesi di abbonamento). Cliccando sul pulsante, l'utente accetta di EULA e politica sulla riservatezza. Il download si avvierà automaticamente.

Scarica SpyHunter

per le finestre

Prova SpyHunter per Mac

SpyHunter per Mac rimuove completamente tutte le istanze dei virus più recenti da Mac/MacBook e Safari. inoltre, più snella può aiutare ad ottimizzare MacOS e liberare spazio su disco. Compatibile con tutte le versioni di MacOS. La versione gratuita di SpyHunter per Mac ti consente, soggette ad un periodo di attesa di 48 ore, una correzione e rimozione per i risultati trovati. La versione completa di SpyHunter costa $42 (si ottiene 6 mesi di abbonamento). Cliccando sul pulsante, l'utente accetta di EULA e politica sulla riservatezza. Il download si avvierà automaticamente.

Scarica SpyHunter per Mac

versioni MacOS

Deceptive Claims and False Association

It is essential to note that these emails are in no way associated with the official United States Postal Service (USPS). The scammers impersonate USPS to gain the recipient’s trust. They use the USPS logo, marchio, and official language to make the email appear legitimate. però, all the information provided in the email is false, and the claims made are entirely fabricated.

Phishing Website

Upon clicking the “Send my package” button in the email, recipients are redirected to a fake USPS website. This phishing webpage is designed to collect personally identifiable information and financial data. Scammers can use this information for various illicit activities, including identity theft, unauthorized online purchases, and illegal access to the victim’s computer.

Potential Monetary Transactions

In addition to collecting personal information, these scams may also trick victims into making monetary transactions. Per esempio, they may request payment for fake fees or redirect individuals to fraudulent payment portals. It is crucial to be cautious and avoid providing any financial information or making payments through these deceptive channels.

Recognizing a Fake USPS Email

Check the Sender’s Email Address

One of the first steps in identifying a fake USPS email is to carefully examine the sender’s email address. Hover over the “from” address and verify if it matches the official USPS domain, which is typically “@usps.com.” Be cautious of email addresses that differ slightly or contain misspellings, such as “@usps-us.com” or “@uspsmail.com.”

Generic Greetings and Lack of Personalization

Legitimate organizations, including USPS, often personalize their communications by addressing recipients by their names. If the email starts with generic greetings like “Dear Customer” or “Dear valued customer,” it should raise suspicions. Genuine emails are more likely to address recipients by their names or usernames.

Suspicious Links

Hover your mouse over any links provided in the email without clicking on them. Verify if the URL displayed matches the official USPS website address, which is “usps.com.” Be wary of links that redirect to unfamiliar domains or have a combination of letters and numbers. These are indicators of a phishing attempt.

Exercise Caution with Attachments

Fake USPS emails may include attachments that are infected with malware. Exercise caution when opening attachments, especially if they are unexpected or from unknown senders. Scan attachments with reliable antivirus software before opening them to minimize the risk of malware infection.

Preventing Malware Infections

Be Cautious with Email and Messages

To minimize the risk of malware infections, exercise caution when receiving emails and other messages. Non aprire allegati o fare clic su collegamenti in e-mail sospette o irrilevanti. Even if an email appears to be from a trusted source, verify its legitimacy before taking any action.

Enable “Protected View” in Microsoft Office

If you receive an email with an attachment from a sender you don’t recognize, it is best to view the document in “Protected View” mode. This mode is available in Microsoft Office versions released after 2010 and helps prevent the automatic execution of malicious macros. By enabling this feature, you add an extra layer of security against potential malware.

Download from Official and Verified Channels

When downloading software, applicazioni, or files, only do so from official and verified channels. Avoid downloading from unfamiliar websites or third-party sources, as these may contain malware or other security threats. Stick to trusted platforms to ensure the safety of your device and personal information.

Update Software Using Legitimate Functions

Always activate and update software using legitimate functions and tools provided by the official developers. Avoid using illegal activation tools or third-party updaters, as they may contain malware. By keeping your software updated, you ensure that you have the latest security patches and protections against known vulnerabilities.

Browse Safely

Exercise caution when browsing the internet, as fake and malicious online content can appear genuine and harmless. Be wary of clicking on suspicious advertisements, pop-up, or links that prompt you to download or install software. Use reputable ad-blockers and browser extensions to enhance your security and protect against potential threats.

Install Reputable Antivirus Software

Having reputable antivirus software installed on your computer is crucial for detecting and removing malware. Regularly scan your system for threats and ensure that your antivirus software is up to date. This proactive approach can prevent malware infections and provide an additional layer of protection against phishing attempts and other cyber threats.

What to Do If You Fall for a Fake USPS Email

Change Passwords Immediately

If you have clicked on a link in a fake USPS email and entered your password, change your password immediately. By changing your passwords promptly, you reduce the risk of cybercriminals misusing your credentials. It is advisable to use strong, unique passwords for each online account to enhance security.

Contact Your Bank

If you have entered your credit card information in response to a fake USPS email, contact your bank or credit card issuer as soon as possible. Inform them about the situation and follow their instructions. They may advise canceling your compromised card and issuing a new one to prevent fraudulent transactions.

Report Identity Theft

If you suspect that your personal information has been compromised as a result of falling for a fake USPS email, report the incident to the appropriate authorities. Contact the Federal Trade Commission (FTC) or visit their website to file a report. They will guide you through the necessary steps to minimize the impact of identity theft and help you recover.

Scansiona il tuo computer alla ricerca di malware

If you have opened an attachment from a fake USPS email and suspect that your computer is infected, scan it with reputable antivirus software. Perform a thorough scan to detect and remove any malware that may have been installed. Consider using trusted antivirus tools like Combo Cleaner Antivirus for macOS to handle the removal process effectively.

Educate Others and Report Scams

Help protect others from falling victim to fake USPS emails by reporting any phishing attempts you encounter. Report the scam to Anti-Phishing Working Group, FBI’s Internet Crime Complaint Center, National Fraud Information Center, and the U.S. Department of Justice. By raising awareness and reporting scams, you contribute to the collective effort in combating cybercrime.

Strumento antispam consigliato:

Prova MailWasher

La sicurezza della posta elettronica è la prima linea di difesa contro i virus ransomware. Per fare questo, ti consigliamo di utilizzare MailWasher. MailWasher blocca i virus ransomware provenienti da spam e phishing, e rileva automaticamente gli allegati e gli URL dannosi. Inoltre, i messaggi dannosi possono essere bloccati anche prima che il destinatario li apra. Poiché la principale fonte di diffusione dei virus ransomware sono le e-mail infette, antispam riduce significativamente il rischio che un virus appaia sul tuo computer.

Scarica MailWasher

Conclusione

Fake USPS “Your Package Is Waiting For Delivery” emails are a common form of phishing scam that aims to deceive individuals into providing personal information or making monetary transactions. By understanding the signs of a fake USPS email and taking preventive measures, you can avoid falling victim to these scams. Resta vigile, exercise caution with email attachments and links, and keep your computer protected with reputable antivirus software. Seguendo queste linee guida, you can ensure a safer online experience and protect yourself from cyber threats.

Lascia una risposta

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *