Beware of fake delivery SMS that know your exact address

Scammers are now sending highly personalized SMS posing as delivery personnel, including victims' names, addresses, and sometimes access codes. These messages, tied to recent data breaches, lead to fake sites designed to steal personal information. Authorities advise against clicking links and checking directly with official services.

SMS scams are becoming more sophisticated in France. Traditionally, these frauds started with a generic message like 'hello, it's the delivery person, your package doesn't fit in the mailbox,' prompting rescheduling to steal bank codes. But in recent days, many users have reported messages including their first name, last name, exact address, and sometimes access code.

A typical example: 'Hello, I have a package for [person's name]. I stopped by [address] this morning, but since I had no info, please give new instructions here,' followed by a link to a fraudulent site requesting extra delivery fees.

'Getting worse and worse,' laments a Reddit user. 'Received SMS this morning for an undelivered package (classic) but this time my address is included and the link has my name and first name. Now it's really getting worrying,' he adds.

These scams draw from recent cyberattacks on companies like Mondial Relay, La Poste, France Travail, and Urssaf. Last week, Colis Privé suffered a breach exposing data of 3 million French people – first names, last names, postal addresses, emails, and phone numbers – on the dark web.

To protect yourself, avoid clicking suspicious links. Check official sites of Colissimo, DHL, DPD, Chronopost, or Mondial Relay instead. Spot spelling or grammar errors. Check data leaks on haveibeenpwned.com or oathnet.org.

Awọn iroyin ti o ni ibatan

La Poste control room during partial online service restoration post-cyberattack, with ongoing normal parcel operations amid Christmas in Paris.
Àwòrán tí AI ṣe

La Poste partially restores online services after cyberattack

Ti AI ṣe iroyin Àwòrán tí AI ṣe

La Poste's online services were partially restored on Tuesday, December 23, 2025, following a denial-of-service cyberattack that disrupted the company just two days before Christmas. The attack, claimed by pro-Russian hackers, also affected La Banque Postale customers but did not compromise personal data. Parcel and mail distribution proceeded normally despite ongoing instability.

Pro-Russian hacker group Noname057 has claimed the December 22 DDoS attack on France's La Poste that disrupted online services before Christmas. As of December 24, systems remain partially affected despite partial restorations reported the previous day.

Ti AI ṣe iroyin

Security experts are cautioning PayPal users about a scam where the platform's subscription feature is being exploited to deliver fraudulent purchase confirmation emails. This abuse leverages the legitimate PayPal system to deceive recipients into believing they have made unauthorized transactions. The warning highlights the need for vigilance in verifying email authenticity.

Cybersecurity experts warn that hackers are leveraging large language models (LLMs) to create sophisticated phishing attacks. These AI tools enable the generation of phishing pages on the spot, potentially making scams more dynamic and harder to detect. The trend highlights evolving threats in digital security.

Ti AI ṣe iroyin

The Japanese government has decided to require mobile carriers to verify the identities of buyers of data-only SIM cards to curb fraud perpetrated via social media. The move targets scams such as fake investment and romance schemes. The Internal Affairs and Communications Ministry plans to submit a bill to amend the relevant law to the Diet by the end of this year.

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

Ti AI ṣe iroyin

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

 

 

 

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ