Do not trust "Is this you package?" scam website
Written by Tomas Meskauskas on (updated)
What is "Is this your package?"?
This is a scam website used by criminals to extort money from unsuspecting people. It is disguised as the website of an international department of lost and found packages. The main purpose of this site is to trick recipients into paying for delivery of unclaimed packages.
Generally, websites of this type are opened through other untrustworthy web pages, deceptive advertisements or potentially unwanted applications (PUAs) installed on browsers and/or operating systems. In any case, these pages cannot be trusted and should be avoided.
Once opened, this website displays a photo of a package and asks if the item belongs to the site visitor. At the time of research, it displayed photos of packages with boxes containing iPhone 11 and Samsung Galaxy S10 smartphones. This website often deceives visitors into paying for delivery of a supposedly lost and found package.
It might also ask people to provide various details such as email address, name, surname, address, telephone number and other information. Some websites of this kind also ask for private, sensitive information. Typically, scammers behind these pages misuse the details to generate revenue.
Trusting this scam website could lead to financial loss, problems relating to privacy, browsing safety, and it is possible that the information will be misused to steal users' identities. Do not trust this or other, similar web pages. If your browser opens untrustworthy websites automatically, it is likely that it is forced to do so by PUAs installed on the browser or operating system.
PUAs are often designed to open dubious, deceptive websites, gather browsing data and/or display intrusive advertisements. Typically, they collect users' IP addresses, list of entered search queries, visited websites, geolocations, and other browsing data. In some cases, they collect private information.
Developers share the details with third parties (potentially, cyber criminals) who misuse them to generate revenue. Many PUAs feed users with coupons, banners, surveys, pop-ups and other forms of ads. People who click these are usually redirected to untrustworthy web pages and, in some cases, the ads execute scripts that cause download/installation of unwanted software.
Name | Is this your package? pop-up |
Threat Type | Phishing, Scam, Social Engineering, Fraud. |
Fake Claim | According to this scam page, there is an unclaimed package that can be received by paying for delivery. |
Related Domain | finanaco[.]com (there could be other domains) |
Serving IP Address (finanaco[.]com) | 192.64.119.87 |
Symptoms | Fake error messages, fake system warnings, pop-up errors, hoax computer scan. |
Distribution methods | Compromised websites, rogue online pop-up ads, potentially unwanted applications. |
Damage | Loss of sensitive private information, monetary loss, identity theft, possible malware infections. |
Malware Removal (Windows) | To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
Other examples of scam websites include "Get the new iPhone 11 Pro", "Randomly selected to test the new iPhone" and "SPECIAL AWARD FROM OUR SPONSORS".
Typically, these web pages deceive visitors into providing various information. Some demand confidential information such as credit card details. Websites of this kind should never be trusted, since this usually leads to problems and nothing more.
How did potentially unwanted applications install on my computer?
Typically, people download and install PUAs unintentionally through clicked intrusive ads or the download/installation set-ups of other programs. To trick people into unwanted downloads or installations through set-ups, developers use a deceptive method called "bundling".
They include PUAs into set-ups of other (usually free) software and hide related information in settings such as "Custom", "Advanced" and so on. If these settings remain unchanged, PUAs are downloaded and installed through the set-ups of regular software. Unfortunately, many people fail to check the settings available in the set-ups.
How to avoid installation of potentially unwanted applications
We strongly recommend that you download software using only official sources (websites) and directs links. Tools such as third party software downloaders, installers, torrent clients, eMule (or other Peer-to-Peer networks) and similar sources should not be used. Check "Advanced", "Custom" and other sections of the download/installation dialog (setup).
Ensure that there are no checkboxes ticked by default - deselect offers to install unwanted software. If redirects to untrustworthy websites (such as gambling, pornography, adult dating and so on) occur often (or intrusive ads appear regularly), it is possible that PUAs are installed on your computer or browser.
Check for suspicious entries (plug-ins, add-ons, extensions) installed on your web browser (or programs on the computer) and uninstall/remove them immediately. If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate them.
Text presented on the initial web page:
Friday, January 17, 2020
International department
of lost and found
IS THIS YOUR PACKAGE?Yes - This is mine
No - This is not mine
Screenshot of the second page:
Text in this page:
Friday, January 17, 2020
International department
of lost and foundPackage information:
Status:
Unclaimed. Ready for delivery
Deadline:
Friday
Content:
Apple iPhone 11
Delivery cost:
Proceed to fulfillment
The appearance of "Is this your package?" scam (GIF):
Another variant of this scam website (initial page):
Second page of this variant:
Appearance of this variant (GIF):
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is Is this your package? pop-up?
- How to identify a pop-up scam?
- How do pop-up scams work?
- How to remove fake pop-ups?
- How to prevent fake pop-ups?
- What to do if you fell for a pop-up scam?
How to identify a pop-up scam?
Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.
While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.
Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:
- Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
- Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
- Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
- Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
- Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.
Example of a pop-up scam:
How do pop-up scams work?
Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.
Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.
How to remove fake pop-ups?
In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.
In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.
How to prevent fake pop-ups?
To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.
To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for Windows.
What to do if you fell for a pop-up scam?
This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.
- If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
- If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
- If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for Windows) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
- Help other Internet users: report Internet scams to Federal Trade Commission.
▼ Show Discussion