The “Package Suspended Wrong Address” Text Scam Explained
Written by: Stelian Pilici
Published on:
The rise of online shopping and package deliveries has led to an increase in package delivery scams. One such scam involves receiving a text message stating that your package has been suspended due to an incorrect street number. This article will provide an in-depth look at how this scam works, what to do if you receive this message, and how to avoid falling victim.
This article contains:
Overview of the “Package Suspended” Scam
This scam starts when potential victims receive a text message claiming that a package delivery company has suspended delivery of their package due to an incorrect street number. The message will look something like this:
“Your package has been suspended due to the wrong street number on the package. Please update your address: https://postoffce.cfd“
The link in the message leads to a fake website designed to look like a legitimate package delivery site. On this site, victims are prompted to enter personal details like their name, address, and credit card information to allegedly correct the delivery address and pay a re-delivery fee.
In reality, the scammers behind this con do not have any package. The fake website is a phishing scam aimed at stealing personal and financial information. This lucrative scam has become more common as more people shop online and expect more frequent deliveries.
What the Scammers Are After
The end goal of this scam is to steal money and personal information. By tricking victims into inputting details into the fake site, scammers can:
Obtain names, addresses, phone numbers, and emails to sell or use in future scams
Steal credit card details to make fraudulent purchases
Charge fake re-delivery fees they pocket
Gain logins and passwords to hack into accounts
Steal identities to open credits cards and commit fraud
Armed with the sensitive data entered, the criminals can gain access to accounts, commit identity theft, and cause serious financial harm.
Prevalence of This Con
This parcel delivery scam has become widespread in the past few years for several reasons:
More people are shopping online and receiving deliveries, so a message about a missed delivery seems legitimate.
Criminals are getting increasingly sophisticated at creating real-looking fake delivery company websites.
Smartphone text messaging provides an easy way for scammers to reach many victims quickly.
Caller ID spoofing technology allows scammers to mask the source of texts and make them appear to come from a legitimate business.
During the COVID-19 pandemic, this scam skyrocketed as more consumers shopped online and expected more frequent package deliveries. Unfortunately, if a text message states your delivery has been suspended, it’s almost certainly a scam attempt. Legitimate delivery companies will not contact you this way.
How the “Package Suspended” Scam Works
Scammers carry out this con in several clever ways designed to convince victims the message is real. Here is how the scam typically operates:
1. Victims Receive a Text About a Suspended Delivery
The scam starts with an SMS text sent to the victim’s smartphone. The message appears in the same text messaging app used for all texts, making it seem more legitimate.
The text will come from a number designed to look like it could be from a delivery service like UPS, FedEx, Amazon, or DHL. For example:
“UPS: Your package has been suspended due to an incorrect shipping address. Please update your information here: http://addressfix.verifyinfo.net”
The message may reference an actual tracking number and a link to “resolve” the issue, adding credibility. Of course, the tracking number is made up and the link sent is to a fake site controlled by scammers.
2. The Link Leads to a Realistic But Fake Website
If victims click the link, it takes them to a website designed to mimic a delivery company site. The scam web pages look convincingly real, with logos, branding, photos, and messaging appearing legitimate.
The site will prominently display urgent-sounding messages instructing you to update your address and billing details to resume your delivery. Fields will ask for sensitive personal and financial information like:
Full name
Address
Phone number
Email address
Credit card number
CVV security code
Bank account numbers
3. Scammers Use Your Information for Fraud & Theft
If victims enter any personal or financial information, the scammers immediately gain access and use the details maliciously. They may:
Charge your credit card for a fake re-delivery fee
Use your name, number, and address in future phishing attempts
Access and drain your bank account
Make purchases using your credit card or stolen identity
Open new credit cards in your name
Steal your identity to commit serious fraud
Meanwhile, you never receive whatever item you were expecting to be delivered. Legitimate delivery companies like UPS do not operate or request info this way.
4. Criminals Are Nearly Impossible to Trace
Scammers go to great lengths to conceal their identity and location when running cons like this. Tactics they use include:
Routing texts through many servers across the world
Using burner phones that can’t be traced back to them
Masking caller ID so texts appear from a legitimate business
Providing fake names and contact info on their scam sites
Between number spoofing, disguising their URLs, using proxy servers, and more, scammers make it exceedingly difficult for authorities to track them down. Even contacting the website host or domain registrar yields little useful information on the criminals.
So once your information gets in scammers’ hands, the situation becomes incredibly challenging to rectify. This makes avoidance the best policy when it comes to package delivery scams.
What to Do If You Get This Scam Message
If you receive a text out of the blue claiming your package delivery has been suspended, here are important steps to take:
Do Not Click Any Links
First and foremost, do not click the link contained in the message under any circumstances. As examined above, the link goes to a fake website controlled by scammers to steal your information. No real delivery service will operate this way.
Look up the Actual Customer Service Number
Your best bet is to call the customer service number listed on the real delivery company’s website. Look up the official UPS, FedEx, Amazon, or other site and reach out to customer service directly.
Explain you received a suspicious text message about a suspended package. Customer service can look up your account and shipping information to clarify whether there are any actual issues.
Report the Scam Text
An important step is reporting the scam text message so operators can attempt to shut down the phone numbers involved. You can report scam texts in several ways:
Report to the FTC at https://reportfraud.ftc.gov/. Provide the fake number, content of the messages, and any other details.
Forward the text to SPAM (7726) for your carrier. This alerts phone companies of the fraudulent messages so they can investigate and potentially block the numbers being used.
File a complaint with the FCC at https://consumercomplaints.fcc.gov/hc/en-us. Supply any evidence you have of illegally spoofed numbers.
Let the real shipping company know about scammers impersonating their brand. Also notify your state or local consumer protection agencies. The more reports authorities get, the better chance they have of combating scam texts.
Reset Accounts If Compromised
If you did happen to click the link and provide any sensitive information, immediately take steps to protect your accounts. Change passwords on financial accounts, lock credit reports, contact banks about unauthorized charges, and consider cancelling credit cards known to scammers. Take preventative action to limit the fallout.
Use Caution with Future Delivery Notices
Going forward, use extra scrutiny with any texts or calls about suspended deliveries. Legitimate shipping companies will not contact you this way without extensive verification – which scammers cannot provide over a text. Always research numbers yourself and never click links in unsolicited messages.
How to Avoid Falling Victim to This Scam
While this parcel delivery scam is sophisticated, there are ways to detect and avoid it:
Know How Real Delivery Companies Operate
Genuine shipping companies like UPS and FedEx will never contact consumers via text message about suspended packages. This is always a scam tactic. Familiarize yourself with how logistics companies really communicate about deliveries:
Tracking updates are provided online or via email only.
You may get an automated call with a tracking number, but nothing more.
Any official communications will identify themselves extensively before asking for info.
You need to initiate contact first for delivery issues. They won’t text you.
Be Wary of Unexpected Requests for Information
A core tactic of nearly all scams is asking for personal information unexpectedly via phone, email, or text. Legitimate businesses won’t surprise you by requesting sensitive details out of context. Always verify any fishy communications through an independent channel before providing info.
Watch for Red Flags in Links
Closely analyze the URLs in any text or email messages to look for signs of a scam:
Misspelled or suspicious domain names (e.g. “fed-exx.com”)
URLs not matching company names
Links reporting errors/warnings when checked
Non-https sites
Long, convoluted links
Don’t Trust Caller ID
Thanks to spoofing technology, scammers can make calls and texts appear from essentially any number. Just because a text says UPS or shows their number means nothing. Use an independent channel or source to follow up if something seems suspicious.
Keep Device Software Up to Date
Maintaining the latest security patches and software updates can help protect you from phishing websites, malicious texts, spam calls, and other scam techniques. Outdated apps and operating systems make it easier for criminals to infiltrate devices and compromise accounts.
Don’t Provide Information to Unverified Parties
Whenever asked for personal or financial data, take time to directly confirm the legitimacy of the request through known contacts. Validation takes just a few minutes and could save you from catastrophic losses to identity thieves.
Preemptively confirming communications, analyzing links carefully, understanding how companies really operate, and updating your device software are solid precautions against delivery scams.
What to Do if You Provided Your Information to Scammers
If you fell victim and supplied any sensitive information through the phishing site, take these immediate steps to mitigate damages:
Call banks and credit cards – Alert financial institutions to any compromised cards or accounts. Request replacements and monitor statements vigilantly for signs of fraud.
Place fraud alerts – Contact credit bureaus to place alerts on credit reports to detect any attempts at identity theft. Monitor your reports closely over the next year.
Change passwords – Update passwords, security questions, and pins for any email, financial, utility, or other accounts that may have been accessed by scammers. Enable two-factor authentication where possible.
Cancel affected accounts – Consider closing down accounts known to be compromised that you don’t necessarily need to keep open. Opening new accounts with new numbers reduces risks.
Contact the FTC – Reporting the incident helps authorities track and respond to emerging scams targeting consumers.
Review your credit reports – Order your free annual credit reports and comb them for any signs of accounts opened without your authorization. Dispute any fraudulent items.
Enroll in credit monitoring – Sign up for monitoring services that provide alerts whenever new accounts or loans are requested in your name so you can nip fraud in the bud.
File a police report – Filing a formal fraud complaint with local law enforcement creates an official record that may help in resolving financial matters and credit reporting issues.
Learn from the incident – Use the event as motivation to implement tighter cybersecurity and online privacy practices to avoid being victimized moving forward.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
Frequently Asked Questions About This Package Delivery Scam
Am I really getting a package that requires an address update?
No. This is a scam designed to steal your personal information. Legitimate delivery services will not contact you out of the blue via text about an issue with a delivery. Any such message is fake.
Can’t I just click the link to fix the problem with my package?
Do not click the link or call any phone numbers in these scam texts. The links lead to fake websites run by scammers aiming to steal your data. Calling the numbers connects you to the criminals.
What if I paid the re-delivery fee – will they deliver my package now?
Unfortunately, any money sent is pocketed by scammers. There is no actual suspended package to re-ship. The entire incident is fabricated solely to extort payments from victims. No items will be delivered.
Why are delivery scams becoming more common now?
With the huge rise in ecommerce and deliveries, scams capitalize on consumers constantly expecting packages. Criminals spoof legitimate business names and numbers to seem real. More deliveries mean more delivery scam attempts.
How did the scammers get my phone number or know I was expecting a package?
Scammers send these texts en masse to random numbers, knowing a certain percentage of people will be awaiting a real delivery. They don’t actually have your info – they get it when you click their links.
Are these scams illegal? Why can’t officials stop it?
Yes, text scams violate numerous state and federal fraud, identity theft, and consumer protection laws. However, scammers are experts at hiding their tracks using spoofing, proxies, and fake info. This makes enforcement challenging.
What should I do if my information was compromised?
Immediately contact banks, credit cards, and credit bureaus to report compromised accounts and identities. Freeze credit reports, change account numbers and passwords, and monitor for fraudulent activity in the coming years.
How can I avoid falling for this scam in the future?
Learn to recognize signs of phishing attempts like unexpected requests for info and shady links. Only contact trusted sources through known channels if an issue arises. And never provide info via unverified communications.
Who can I report these fraudulent texts to?
You can report the scam messages to the FTC, FCC, your cell provider, local law enforcement, state attorney general office, and the legitimate company being impersonated. Reporting aids further prevention efforts.
The Bottom Line
The “your package is suspended” scam can seem convincing thanks to convincing texts, spoofing, and realistic fake websites. But awareness of common delivery scams, overall online vigilance, and trust of official customer service channels can help you sidestep being swindled.
A savvy consumer remains skeptical of unexpected requests for information over text or email. Genuine logistics companies never contact customers this way – any such message is an attempted con. Look up official numbers, report suspicious texts, and be selective where you provide private data to stay protected.
With the exponential growth of package deliveries, odds are high this scam will only proliferate further. But an informed public can ensure this con ends up being nothing more than a dead end for scammers.
So remember – no matter how real a “your package is suspended” text may seem, reacting to it only causes real issues for victims. Maintain caution around all unsolicited communications to stop phishing scammers in their tracks.
How to Stay Safe Online
Here are 10 basic security tips to help you avoid malware and protect your device:
Use a good antivirus and keep it up-to-date.
It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.
Keep software and operating systems up-to-date.
Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.
Be careful when installing programs and apps.
Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."
Install an ad blocker.
Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.
Be careful what you download.
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.
Be alert for people trying to trick you.
Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.
Back up your data.
Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.
Choose strong passwords.
Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.
Be careful where you click.
Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.
Don't use pirated software.
Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.
To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.
Meet Stelian Pilici
Stelian leverages over a decade of cybersecurity expertise to lead malware analysis and removal, uncover scams, and educate people. His experience provides insightful analysis and valuable perspective.