Skip to main content Skip to main menu Skip to footer

Brushing scams

Brushing scams

Decrease Text Size Increase Text Size

Page Article

A brushing scam involves receiving packages you didn’t order, often from major online retailers. Fraudsters use your address and name to create fake orders, artificially inflating sales numbers and product reviews. While this might seem harmless—after all, you’re getting free items—brushing scams can indicate that your personal information has been compromised.

How Brushing Scams Work

  • Fake Accounts Are Created: Scammers use stolen or fake credentials to create accounts on e-commerce platforms.
  • Orders Are Placed: Using these accounts, scammers place orders for products and have them shipped to unsuspecting individuals.
  • Fake Reviews Are Posted: Once the order is "delivered," they leave glowing reviews to boost the product's visibility and credibility.

Why You Should Be Concerned

  • Compromised Personal Information: Your name, address, and possibly other details might be in the hands of scammers.
  • Fraudulent Activity: These scams could be tied to larger identity theft schemes.
  • Inaccurate Product Ratings: Fake reviews mislead consumers, promoting poor-quality or unsafe products.

How to Identify a Brushing Scam

  • Unexpected Packages: You receive items you didn’t order or recognize.
  • No Billing Record: There’s no charge on your account for the items.
  • Suspicious Packaging: The items may arrive in unmarked boxes or seem unusual in quality.

Prevention and Protection Tips

Safeguard Your Personal Information
  • Limit Personal Information Online: Avoid sharing your address or phone number on public platforms.
  • Monitor Data Breaches: Use services to check if your email or information has been exposed in data breaches.
  • Use Strong Passwords: Protect your e-commerce accounts with strong, unique passwords. Enable two-factor authentication whenever possible.
Monitor Your Online Accounts
  • Check Order History: Regularly review your purchase history on e-commerce platforms to ensure there are no unauthorized orders.
  • Review Payment Methods: Look for unfamiliar transactions on your credit or debit card statements.
Take Action if You Receive a Package
  • Contact the Retailer: Notify the retailer that you’ve received an unsolicited package. They may investigate the seller’s account.
  • Do Not Keep or Use the Item: Using unsolicited items can complicate fraud investigations.
  • Report to Authorities: Report the scam to local consumer protection agencies or the Federal Trade Commission (FTC) in the U.S.
Enhance Your Digital Security
  • Use a Virtual Address: Services like PO boxes or virtual mailboxes can prevent scammers from knowing your home address.
  • Shop from Trusted Sellers: Stick to reputable e-commerce platforms and verify seller ratings.
Spread Awareness
  • Educate Family and Friends: Share information about brushing scams to help others recognize and avoid them.
  • Leave Honest Reviews: Contribute genuine reviews to counteract fake ones and support honest sellers.

What to Do If You’re a Victim

  • Change Your Passwords: Update passwords for all your online accounts, especially e-commerce sites.
  • Monitor Your Credit: Keep an eye on your credit reports for signs of identity theft.
  • Report Fraud: File a complaint with your national consumer protection agency, such as the FTC or local fraud prevention agencies.
If you’ve received unexpected packages, take action immediately to ensure your personal information remains safe and secure. Prevention is key—stay informed, stay safe, and always double-check the origins of unsolicited deliveries.

How Compromised Data is Used in Brushing Scams and Beyond

Your personal information, also known as Personally Identifiable Information (PII), is a valuable commodity for cybercriminals. When your PII is compromised, it can be used in various malicious ways, both for brushing scams and other types of fraud. Here’s how your data is exploited and the most common ways it gets compromised.

How Compromised Data is Used

  • Creating Fake Accounts: Scammers use stolen names, addresses, and other details to create accounts on e-commerce platforms. These accounts enable them to:
    • Place fake orders.
    • Post fraudulent reviews to boost product ratings.
  • Targeting You for Phishing Scams: With your information, fraudsters craft convincing emails, text messages, or calls designed to trick you into providing more sensitive data, like credit card numbers or passwords.
  • Reselling Information: Stolen PII is often sold on the dark web to other criminals who may use it for identity theft, account takeovers, or financial fraud.
  • Identity Theft: Scammers can use your data to open bank accounts, apply for loans, or even file fraudulent tax returns in your name.
  • Misleading Others: Your address might be used as a "legitimate" delivery destination for fake orders, making the scam appear credible to retailers and consumers.

Why Protecting Your PII is Crucial

The misuse of PII in brushing scams is just the tip of the iceberg. Criminals with access to even basic details like your name and address can exploit them for more significant and damaging scams. By understanding how your data is compromised and used, you can take proactive steps to protect yourself and minimize your risk.

Remember, vigilance and awareness are your best defenses against these evolving threats.



Page Footer has no content