{"id":22299,"date":"2023-06-22T16:11:05","date_gmt":"2023-06-23T00:11:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/06\/22\/news-16029\/"},"modified":"2023-06-22T16:11:05","modified_gmt":"2023-06-23T00:11:05","slug":"news-16029","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/06\/22\/news-16029\/","title":{"rendered":"UPS warns customers of phishing attempts after data accessed"},"content":{"rendered":"<p>UPS Canada is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ups-discloses-data-breach-after-exposed-customer-info-used-in-sms-phishing\/\" target=\"_blank\">warning customers in Canada<\/a> of potential data exposure and the risk of phishing. People have started to receive letters like the one below from UPS, which some have assumed were &ldquo;just&rdquo; regular phishing alerts. As it turns out, the letter is specifically about the potential exposure of data via a look-up tool.<\/p>\n<p>One example of the letter is below, via a tweet from threat analyst Brett Callow.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">So <a href=\"https:\/\/twitter.com\/UPS_Canada?ref_src=twsrc%5Etfw\">@UPS_Canada<\/a> sent me a letter about phishing and smishing. Turns out it wasn&#8217;t simply intended to be educational. In the 4th paragraph, it became apparent that it was actually a data breach notification. 1\/2 <a href=\"https:\/\/t.co\/lw7PI7HORI\">pic.twitter.com\/lw7PI7HORI<\/a><\/p>\n<p> &mdash; Brett Callow (@BrettCallow) <a href=\"https:\/\/twitter.com\/BrettCallow\/status\/1671532524705570818?ref_src=twsrc%5Etfw\">June 21, 2023<\/a><\/p><\/blockquote>\n<p>You&rsquo;ll notice why recipients assumed it was a generic phish warning straight away: There is no reference to any actual incident until halfway down the page. The whole first half is a generic description of what phishing and smishing involve, alongside a link to examples and where genuine UPS texts originate.<\/p>\n<p>I would think many people looking at this would have already tuned out and thrown it into the garbage. In this case, that would be a mistake. Anyone who reads on will (eventually) discover that all is not right in the land of parcel deliveries:<\/p>\n<blockquote>\n<p>UPS is aware that some package recipients have received fraudulent text messages demanding payment before a package can be delivered. UPS has been working with partners in the delivery chain to try to understand how that fraud was being perpetrated.<\/p>\n<\/blockquote>\n<p>The letter goes on to mention that an internal review took place to see if information it received from shippers was somehow contributing to these attempts taking place:<\/p>\n<blockquote>\n<p>During that review, UPS discovered a method by which a person who searched for a particular package or misused a package look-up tool could obtain more information about the delivery, potentially including a recipient&#8217;s phone number.<\/p>\n<\/blockquote>\n<p>UPS states that access to this information has now been limited, and people whose information may have been impacted are being notified out of &ldquo;an abundance of caution&rdquo;.<\/p>\n<p>In terms of the data potentially accessed:<\/p>\n<blockquote>\n<p>The information available through the package look up tools included the recipient&rsquo;s name, shipment address, and potentially phone number and order number. We cannot provide you with the exact time frame that the misuse of our package look-up tools occurred. It may have affected packages for a small group of shippers and some of their customers from February 1, 2022 to April 24, 2023.<\/p>\n<\/blockquote>\n<p>This isn&rsquo;t great, and it&rsquo;s exactly the kind of data needed to get the phishing ball rolling. Bleeping Computer notes some other messages doing the rounds which may be tied to this campaign, which include&nbsp;delivery fee charges owed, and missing shipments of Lego.<\/p>\n<p>Parcel Delivery scams are a big problem, and target firms like UPS and <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/04\/usps-your-package-could-not-be-delivered-text-is-a-smishing-scam\">even the US Postal Service<\/a>. Being able to grab personal details from actual delivery firms is a major boon for scammers so it&rsquo;s essential to be on your guard where mysterious parcel texts and emails are concerned.<\/p>\n<h2>How to avoid&nbsp;fake parcel scams<\/h2>\n<ul>\n<li><strong>Check your orders<\/strong>. The email isn&rsquo;t going anywhere, and neither is your order. You have plenty of time to see if you recognise parcel details, and also the delivery network.&nbsp;<\/li>\n<li><strong>Avoid attachments<\/strong>. So-called invoices or shipping details enclosed in a ZIP file should be treated with suspicion.<\/li>\n<li><strong>Watch out for a&nbsp;sense of urgency<\/strong>. Be wary of anything applying pressure to make you perform a task. A missing payment and only 24 hours to make it? A time-sensitive refund? Mysterious shipping charges?&nbsp;These&nbsp;are all designed to hurry you into action.<\/li>\n<li>If in doubt, make contact with the company directly via official channels.<\/li>\n<\/ul>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\" target=\"_blank\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/ups-warns-customers-of-phishing-attempts-after-data-accessed\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/personal\" rel=\"category tag\">Personal<\/a><\/p>\n<p>Tags: UPS<\/p>\n<p>Tags:  delivery<\/p>\n<p>Tags:  scam<\/p>\n<p>Tags:  phish<\/p>\n<p>Tags:  phishing<\/p>\n<p>Tags:  smishing<\/p>\n<p>Tags:  SMS<\/p>\n<p>Tags:  text<\/p>\n<p>Tags:  fake<\/p>\n<p>Tags:  data<\/p>\n<p>UPS is warning Canadian customers of potential phishing attempts after data was left accessible via look-up tool.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/ups-warns-customers-of-phishing-attempts-after-data-accessed\" title=\"UPS warns customers of phishing attempts after data accessed\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/ups-warns-customers-of-phishing-attempts-after-data-accessed\">UPS warns customers of phishing attempts after data accessed<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[6270,25383,11539,26699,10511,3924,3985,12795,11706,15669,12613],"class_list":["post-22299","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-data","tag-delivery","tag-fake","tag-personal","tag-phish","tag-phishing","tag-scam","tag-smishing","tag-sms","tag-text","tag-ups"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22299"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22299\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22299"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}