Think That Package Is Safe? 5 New Mail Scams You Should Know About

Unsolicited packages aren’t just free stuff—they’re warning signs of brushing scams that could lead to identity theft. Learn how these scams work, why QR codes pose serious risks, how to protect yourself from SIM swapping, and what to do when mysterious packages arrive at your door. This comprehensive guide explains the hidden dangers behind those unexpected deliveries.

Annemarije DeBoer Avatar
Annemarije DeBoer Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image: Gadget Review

The doorbell rings. A package waits. An unsolicited mystery box might actually be the first warning sign of something far worse.

The humble brushing scam has exploded into a widespread crisis. When these scams escalate to identity theft, the average victim in 2024 loses approximately $1,600 according to federal reports.

Disclaimer: Some images used for commentary and educational purposes under fair use. All rights remain with their respective owners.

What is a Brushing Scam?

Image: Gadget Review

The mechanics are deceptively simple.

Sellers ship cheap trinkets to addresses harvested from data breaches. They create fake accounts using real consumer information, purchase their own products, and post glowing five-star reviews.

For scammers, the math makes perfect sense: spend $5 shipping junk to boost ratings, then rake in $500+ from trusting shoppers. The recipient’s address becomes an unwitting accomplice in this scheme.

Free items might seem beneficial, but they often precede more serious fraud attempts.

Dangers Beyond Fake Reviews

Image: Gadget Review

That mystery package isn’t just about boosting some knockoff product’s ratings. It serves as a warning sign.

Receiving a brushing package confirms scammers already possess name, address, and possibly phone number information. The data has been compromised and sells for up to $15 per record on dark web marketplaces.

Cases frequently follow a pattern where victims receive several brushing packages before experiencing more serious fraud such as unauthorized credit accounts or identity theft.

Understanding QR Codes and Their Risks

Image: Gadget Review

QR codes function as doorways between physical objects and digital destinations. In brushing scams, these convenient portals often lead to digital ambushes.

The most dangerous QR codes redirect to fake banking sites so convincing that even IT professionals can be fooled. Financial accounts can be emptied within days of scanning a malicious QR code from an unexpected package.

These sophisticated phishing operations capture login attempts while simultaneously passing them to the real site, creating the illusion that everything worked normally while credentials are stolen.

The Escalation to SIM Swapping

Image: Gadget Review

A “No service” message on a phone screen might signal the beginning of a financial nightmare.

SIM swapping occurs when scammers call a carrier, impersonate the customer using personal details harvested from data breaches, and convince a representative to transfer the phone number to their SIM card. In 2023, the FBI investigated 1,075 SIM swapping attacks with victims reporting over $48 million in losses.

The aftermath resembles a digital life unraveling in fast-forward. Banking apps become locked. Email becomes inaccessible. Social media accounts get hijacked.

If a phone suddenly loses service without apparent reason, immediate action is required. Using another phone to contact the carrier immediately and freezing all financial accounts can prevent devastating losses.

Amazon as a Prime Target

Image: Gadget Review

Amazon’s sheer size makes it a perfect hunting ground for brushing scammers. The e-commerce giant processes over 1.6 million packages daily, creating perfect camouflage for fraudulent activity.

Studies show 70% of shoppers base purchasing decisions on star ratings, creating irresistible incentives for manipulation. Despite sophisticated fraud detection systems, the company struggles to distinguish between legitimate purchases and brushing scams.

Enabling two-factor authentication on Amazon accounts and regularly auditing order history for phantom purchases provides protection. Legitimate Amazon packages always include order numbers matching account history, while brushing packages typically arrive from generic businesses with minimal identification.

Reporting Unsolicited Packages

Image: Left: Gadget Review, Right: FTC

Reporting brushing scams creates data maps that authorities need to track down organized operations.

For Amazon packages, the process involves navigating to ‘Your Orders,’ clicking ‘Find a missing package,’ then selecting ‘I received a package that I didn’t order.’ Taking photos of everything before reporting helps document the evidence.

Beyond Amazon, reporting should extend to the Federal Trade Commission at ReportFraud.ftc.gov and local postal inspectors. Only about 10% of victims currently report these incidents, creating massive blind spots in enforcement efforts.

Never Scan Unknown QR Codes

Image: Gadget Review

The most important security rule regarding unexpected packages is straightforward: never scan unknown QR codes from unexpected sources.

When mystery packages arrive, any enclosed QR codes should be treated as security threats. Scanning out of curiosity, to check functionality, or even to report the package creates unnecessary risk.

The momentary resistance against the impulse to scan might save thousands of dollars and hundreds of hours recovering from identity theft.

Secure Your Accounts

Image: Keepnet Labs

The digital security landscape divides into two categories: accounts protected by app-based authentication and those vulnerable to SIM swapping.

SMS-based verification should be replaced immediately. Installing an authenticator app (Google Authenticator, Microsoft Authenticator, or Authy) and methodically updating critical accounts starting with email, then banking, then social media provides significantly better protection.

Adding a separate PIN or password to mobile carrier accounts creates another essential layer of protection. Monitoring for unusual activity like unexpected service interruptions or strange verification text requests can provide early warning of potential attacks.

Fifteen minutes spent configuring proper authentication can prevent dozens of hours and thousands of dollars in recovery efforts later.

Be Mindful of Your Online Footprint

Image: Gadget Review

Data breaches often reveal how easily scammers can collect personal information. Common security questions like mother’s maiden name, first pet, high school, and birth date are frequently available on social media profiles.

The FTC has verified that receiving unsolicited packages often indicates personal data has already been compromised. A personal privacy audit across platforms should be conducted regularly. Birthdays, exact addresses, phone numbers, and mother’s maiden names should be removed from public profiles.

Tagged photos and location data that might reveal routine movements or home locations should be reviewed and removed. Quarterly privacy setting checks are recommended, as platforms frequently change defaults during updates.

The Tip of the Iceberg

Image: Gadget Review

Brushing scams function as the visible portion of a massive fraud iceberg lurking below the digital surface. These seemingly innocuous packages serve as testing grounds for more sophisticated attack methods.

Random unsolicited packages represent more than just fake review schemes – they signal personal information has already been compromised somewhere upstream. The package itself indicates placement on an active target list.

Freezing credit reports, enabling advanced authentication, and reporting suspicious activities immediately provide essential protection. Avoiding unknown QR codes eliminates a major vulnerability.

In the growing arms race between consumers and fraudsters, vigilance isn’t excessive – it’s the minimum requirement for digital security in 2025.

Share this Article

About Gadget Review’s Editorial Process

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →