Connect with us
Finance Digest is a leading online platform for finance and business news, providing insights on banking, finance, technology, investing,trading, insurance, fintech, and more. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.


By Abigail Showman, Tactical Monitoring Analyst, Flashpoint

Threat actors are not shy about using a legitimate means to satisfy their own goals. They leverage commercial and open source penetration-testing tools to attack networks, some use capabilities at the core of the world’s biggest operating systems and software packages to exploit vulnerable endpoints, while a completely different subset are not above abusing the U.S. mail for financial fraud.

Specifically, Flashpoint analysts have identified numerous discussions on closed and invite-only online communities where threat actors advertise methods and paid services that are earmarked for fraud. Many of these individuals are careful to shield their location, but the majority of these discussions are about the U.S. Postal Service, with a limited number of references to the United Kingdom’s Royal Mail.

Abusing Change of Address Services for Fraud

The majority of these schemes discuss ways to use the USPS’s mail-forwarding to intercept mail and facilitate fraud at a later date. Mail-forwarding in this context refers to change-of-address services including temporary and permanent mail forwarding via the USPS. It appears to be a preferred tactic for fraudsters, much more so than recruiting and partnering with postal service insiders or stealing mail from mailboxes.

Mail theft is instead left to abuse of mail forwarding, which can facilitate credit card fraud and numerous forms of identity theft. Threat actors operating inside underground communities and on chat platforms share information about mail forwarding and change of address methods for fraud, as well as strategies for dealing with credit card companies and addressing questions from issuers about sending newly issued cards to different addresses.

Other actors advertise drop-shipping services that can also involve abuse of the USPS’s change-of-address services. Some actors advertise the creation of custom drop addresses while others share information on setting up fraudulent credit lines that involve the use of USPS mail forwarding.

In addition to using mail forwarding to fraudulently obtain credit cards, there are some threat actors who tout the exploitation of the postal service mail forwarding services specifically for identity theft operations. Tutorials exist to facilitate numerous forms of identity theft that involve the use of USPS mail forwarding to facilitate the creation of a fraudulent credit line, for example.

To a lesser extent, Flashpoint analysts have observed some references to USPS insiders. Many of the discussion threads observed are from individuals claiming to have a post office insider, or solicitations for other actors who may have that kind of access. These actors do not appear to have successfully engaged, however, with other actors to initiate a scheme using the insider, Flashpoint analysts said.


There are a few ways to avoid becoming victims of this type of fraud. Opting for paperless versions of bank statements and other official documents that may contain personally identifiable information (PII) can reduce the likelihood that threat actors intercept sensitive information. Individuals should also monitor their credit report for unusual activity that may indicate a threat actor has fraudulently opened a line of credit.

Additionally, although the USPS sends confirmation letters following a change of address request, if there is a marked decrease in one’s regular volume of mail (including credit card offers or marketing and promotional materials) for a sustained period of time, individuals can contact their post office to check whether a change of address may have been filed under their name.

Continue Reading

Recent Posts