Article Details
Scrape Timestamp (UTC): 2024-04-28 15:32:21.713
Original Article Text
Click to Toggle View
US Post Office phishing sites get as much traffic as the real one. Security researchers analyzing phishing campaigns that target United States Postal Service (USPS) saw that the traffic to the fake domains is typically similar to what the legitimate site records and it is even higher during holidays. Phishing operations typically target people's sensitive information (account credentials, card details) or try to trick users into making payments to fraudulent shops or covering fees supposedly required for clearing items that have been placed on hold for various reasons. USPS phishing During the 2023 holiday season, Akamai Technologies observed a significant volume of DNS queries going to "combosquatting" domains that impersonate the USPS service. Akamai started investigating USPS-themed phishing in October 2023 after an employee received a suspicious SMS that redirected to a site containing malicious JavaScript code. Next, the analysts compiled a list of all domains using the same JS file from the past five months and kept only those with the USPS string in their name. The design of these pages is very convincing and appear as exact replicas of the authentic USPS site with realistic tracking pages for status updates. In one case, the phishing actors set up what looks like a dedicated postage items shop, which started getting significant traffic in late November, as consumers sought to buy gifts and collectibles for the holiday season. From October 2023 to February 2024, the most popular malicious domains that Akamai discovered received nearly half a million queries, with two surpassing 150k each. The most popular top-level domains (TLDs) associated with phishing USPS-themed domains were: The total queries generated by all malicious websites uncovered by Akamai's research during the examined period is over 1,128,146, just short of the 1,181,235 queries recorded for the legitimate USPS site. However, the stats show that traffic to malicious domains between November to December was higher compared to the legitimate one, indicating increased malicious activity during winter holiday season. Akamai only focused this research on USPS, so the actual scale of these combosquatting campaigns that potentially encompass many more brands is likely larger. Consumers should exercise caution and be skeptic about any SMS or email messages about package shipments. To verify the legitimacy of such communications, it's advisable to use the official website (by manually loading it in the browser) to check the delivery status of a product. Clicking on the links included in messages for tracking parcels may lead to malicious locations.
Daily Brief Summary
Security investigations reveal phishing sites impersonating the U.S. Postal Service (USPS) generate traffic levels comparable to the legitimate USPS website, particularly peaking during the holiday season.
Akamai Technologies detected substantial DNS queries to "combosquatting" domains, which closely mimic USPS's online presence, starting from an incident involving suspicious SMS with malicious JavaScript in October 2023.
Analysis highlighted that the most engaged malicious domains, primarily during the October 2023 to February 2024 period, amassed nearly half a million queries, with two sites exceeding 150,000 each.
Phishing tactics involved creating highly convincing replicas of the official USPS website, complete with accurate parcel tracking capabilities, encouraging users to input sensitive data.
One specific scam included a fake postage item shop that gained traffic around November, exploiting consumer activity during the holiday gift-buying season.
The total query count for all identified malicious USPS-themed websites reached over 1.128 million, only slightly less than the queries to the authentic USPS site during the same timeframe.
Consumers are advised to verify package shipment communications directly through the official USPS website, avoiding links in unsolicited emails or SMS.