Fraudulent emails adopt many different forms and are the unauthorised actions of third parties not associated with UPS. These email messages, referred to as ‘phishing’ or ‘spoofing’, are becoming more common and may appear legitimate by incorporating company brands, colours or other legal disclaimers. Help protect yourself by becoming familiar with these methods of fraud:
- Spam: Often referred to as ‘junk mail’, spam consists of email messages that are unsolicited by the recipient and that target the recipient with direct mail messages.
- Phishing: The term ‘phishing’, as in fishing for confidential information, refers to a scam in which the sender attempts to fraudulently obtain and use personal or financial information.
Please be advised that UPS does not request payments, personal information, financial information, account numbers, IDs, passwords or copies of invoices in an unsolicited manner through email, mail, phone or fax or specifically in exchange for the transportation of goods or services. UPS accepts no responsibility for any costs or charges incurred as a result of fraudulent activity. If you have questions about this type of fraud, please contact your UPS representative or email us at firstname.lastname@example.org to verify the validity of any communications.
View Examples of Fraudulent Emails
Awareness and recognition of fraudulent letters, emails and phishing attempts is vital to protecting yourself against theft and other related crimes. Common indicators that an email might be fraudulent include the following:
- Design Flaws: An email containing distorted or irregularly sized logos
- Poor Grammar: Grammatical errors and excessive use of exclamation points
- Misspellings: Incorrectly spelled words or links to altered websites (for example, modifications or variations of the legitimate www.ups.com website address, such as www.unitedparcelservices.com)
Note: UPS sends legitimate email from several URLs, including ups.com and upsemail.com.
- Sense of Urgency: Alarming messages requesting immediate action, such as ‘Your account will be suspended within 24 hours’. or ‘Contact us immediately to claim your parcel or prize’.
- Unexpected Requests: A request attempting to obtain money, financial information (e.g. bank account or payment card numbers), or personal information in exchange for the delivery of a package or other article
- Communication Gaps: An email that does not provide an alternative method for communicating the requested information (i.e. telephone, mail or physical locations)
- Deceptive Link: A link contained within an email that appears to direct your browser to a known, safe site but actually directs your browser to another location, potentially to an unsafe or fraudulent site. You can detect this by hovering over the link with your cursor. This causes the actual destination of the link to display in a pop-up, the lower left of your status bar, or another location depending on your email client. It is suspicious if the actual destination does not match the address in the link. Also be suspicious of links containing numbers in place of letters, abbreviations and slight misspellings in the link.
Some legitimate UPS communications may come in the form of an email with an ‘epackage’ link contained within the email. These messages are designed to increase the protection around sensitive information, and the associated link will always start with https://ftp2.ups.com.
If you receive a fraudulent or suspicious email that claims to be from UPS, do not respond or open any attachments or links associated with the email. Please forward the email and full Internet headers to email@example.com before deleting. Fraudulent emails often appear to come from trusted sources, and the full Internet headers allow us to track the true origin. The Internet headers can be found through your email system from within the email. For example, in Microsoft Outlook, you can find the Internet headers by opening the email, then choosing ‘View’ and ‘Options’. Depending on the email system that you use, the process for locating the Internet headers will vary. Because UPS systems block content that may pose a security risk to our network, we recommend that you either copy and paste the Internet header and message into a new email or scan the email and full headers and send as a PDF attachment to ensure it is received by firstname.lastname@example.org.
Note: When forwarding the suspicious email, do not modify the original subject line or contents enclosed, and do not include any personal or confidential information.