{"id":357412,"date":"2025-08-04T15:16:52","date_gmt":"2025-08-04T09:46:52","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=357412"},"modified":"2025-08-04T15:18:47","modified_gmt":"2025-08-04T09:48:47","slug":"unsolicited-packages-containing-qr-codes-used-to-initiate-fraud-schemes","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/unsolicited-packages-containing-qr-codes-used-to-initiate-fraud-schemes\/","title":{"rendered":"Unsolicited Packages Containing QR Codes Used to Initiate Fraud Schemes"},"content":{"rendered":"<header>\n<div class=\"fields\">\n<p><span style=\"font-family: georgia, palatino, serif;\"><span style=\"font-size: 12pt; color: #222222;\">The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code<\/span><sup id=\"retfn1\" style=\"color: #222222;\"><\/sup><span style=\"font-size: 12pt; color: #222222;\">\u00a0that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone. To encourage the victim to scan the QR code, the criminals often ship the packages without sender information to entice the victim to scan the QR code. While this scam is not as widespread as other fraud schemes, the public should be aware of this criminal activity.<\/span><\/span><\/p>\n<\/div>\n<\/header>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">This is a variation of a &#8220;brushing scam,&#8221; which is used by online vendors to increase ratings of their products. In a traditional brushing scam, online vendors send merchandise to an unsolicited recipient and then use the recipient&#8217;s information to post a positive review of the product. In this variation, scam actors have incorporated the use of QR codes on packages to facilitate financial fraud activities.<\/span><\/p>\n<section>\n<h2><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Tips to Protect Yourself<\/span><\/strong><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Criminals continue to evolve their tactics to target unsuspecting victims. Precautions should be taken prior to scanning any QR codes received through unsolicited communications or packages.<\/span><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Beware of unsolicited packages containing merchandise you did not order.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Beware of packages that do not include sender information.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Take precautions before authorizing phone permissions and access to websites and applications.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Do not scan QR codes from unknown origins.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">If you believe you are the target of a brushing scam, secure your online presence by changing account profiles and request a free credit report from one or all the national credit reporting agencies (Equifax, Experian, and TransUnion) to identify possible fraudulent activity.<\/span><\/li>\n<\/ul>\n<\/section>\n<section>\n<h2><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Report It<\/span><\/strong><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The FBI requests the public report these fraudulent or suspicious activities to the FBI IC3 at\u00a0<a href=\"https:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"noopener\">www.ic3.gov<\/a>. Be sure to include as much information as possible:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The name of the person or company that contacted you.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Methods of communication used, including websites, emails, and telephone numbers.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Any applications you may have downloaded or provided permissions to on your electronic device.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Individuals aged 60 or over who need assistance with filing an IC3 complaint can contact the DOJ Elder Justice Hotline,\u00a0<a href=\"tel:+1(833)372-8311\">1-833-FRAUD-11<\/a>\u00a0(or 833-372-8311).<\/span><\/p>\n<\/section>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">For additional information on similar scams, please see previous Public Service Announcements:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">IC3 | &#8220;<a href=\"https:\/\/www.ic3.gov\/PSA\/2021\/PSA211104\" target=\"_blank\" rel=\"noopener\">The FBI Warns of Fraudulent Schemes Leveraging Cryptocurrency ATMs and QR Codes to Facilitate Payment<\/a>&#8220;.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code\u00a0that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone. To encourage the victim to scan the QR code, the criminals often ship the packages without [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":321735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[37459,37458],"class_list":{"0":"post-357412","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-brushing-scam","9":"tag-unsolicited-packages-containing-qr-codes-used-to-initiate-fraud-schemes"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/357412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=357412"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/357412\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/321735"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=357412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=357412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=357412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}