Threat Database Phishing AliExpress Package Email Scam

AliExpress Package Email Scam

After a thorough examination, cybersecurity experts are warning users about the 'AliExpress Package' emails, identifying them as a crucial element of an ongoing phishing tactic. These deceptive messages falsely assert that the recipient's AliExpress purchase is awaiting delivery. Subsequently, users are prompted to arrange the purported delivery by accessing a fraudulent phishing website. This unsafe site is designed to gather sensitive, personally identifiable information, as well as financial details, resulting in a significant threat to the security and privacy of individuals who fall victim to the scheme. It is essential for users to practice caution and verify the authenticity of such emails to prevent falling prey to potential identity and financial fraud.

The AliExpress Package Email Scam Seeks to Obtain Sensitive User Information

These deceptive emails are likely to carry the subject 'Shipment Pending - AliExpress Package' and masquerade as official delivery notifications from AliExpress. They falsely claim that the recipient's package awaits delivery. The fraudsters employ a tactic where unsuspecting victims are encouraged to use a provided tracking code and subscribe to push notifications as a way to schedule the alleged shipping and prevent any potential delays.

Contrary to the presented information, these emails are entirely fabricated and lack any affiliation with the legitimate AliExpress online retail platform or other reputable entities or services. Upon clicking the 'SCHEDULE YOUR DELIVERY' button within the scam emails, users are redirected to a counterfeit AliExpress shipping site.

This deceptive Web page maintains the ruse by prompting recipients to make various delivery choices, such as selecting a home or work location and specifying workdays or weekends. Additionally, the site requests permission to display browser notification spam. After users make these selections and click the 'Enter your delivery information' button, they are redirected to another webpage.

This new site is equipped with phishing capabilities and targets crucial user details, including first and last names, complete home addresses, email addresses, and telephone numbers. Furthermore, the phishing attempt extends to soliciting credit card data, including the card number, expiry date and CVV.

The acquisition of such private information poses a significant risk, enabling cybercriminals to engage in identity theft and potentially carry out fraudulent transactions and unauthorized online purchases using compromised financial details. It is crucial for recipients to exercise vigilance, recognize the deceptive nature of these emails, and refrain from providing any sensitive information to safeguard against potential harm.

Always Be Careful When Dealing with Unexpected Emails

Identifying phishing or fraudulent emails is crucial to protect oneself from online threats. Here are some red flags that users should look out for to recognize potential phishing or fraudulent emails:

  • Generic Greetings or Salutations:
  • Phishing emails often employ generic greetings like 'Dear Customer' or 'Dear User,' unlike legitimate organizations that usually personalize their communication.
  •  Unexpected Attachments or Links:
  • Be cautious of unexpected attachments or links, especially if the email prompts urgent action. Always hover over any links before clicking on them to preview the URL, and verify it before opening.
  •  Urgent or Threatening Language:
  • Phishing emailsare known for attempting to create a feeling of urgency or use threatening language to manipulate users into taking immediate action, such as claiming an account will be suspended unless action is taken.
  •  Misspellings and Grammatical Errors:
  • Poor grammar and spelling mistakes are common in phishing emails. Legitimate organizations typically proofread their communications carefully.
  •  Requests for Personal or Financial Information:
  • Legitimate organizations rarely rely on emails as a way to receive sensitive information. Be skeptical of emails requesting passwords, credit card details, or other personal information.
  •  Mismatched URLs:
  • Hover over links to verify if the URL matches the legitimate website. Phishing emails often use URLs that closely resemble the real ones but lead to fake websites.
  •  Unsolicited Password Reset Requests:
  • If you receive an unsolicited email requesting a password reset, especially for an account you didn't attempt to reset, it could be a phishing attempt.
  •  No Contact Information:
  • Legitimate organizations provide clear contact information. Lack of contact details or vague information in the email is a red flag.
  •  Too Good to Be True Offers:
  • Emails offering unbelievable deals or prizes are often scams. If something sounds too good to be true, it probably is.

Users should remain vigilant, double-check suspicious emails, and divulge phishing attempts to the relevant authorities or the targeted organization. Regularly updating passwords and using two-factor authentication also adds an extra layer of security.


Most Viewed