The Truth Behind the Brushing Scam: How It Works and What You Can Do About It

Michael04/20/23 02:53

If you've ever received an unsolicited package in the mail, you may have been a victim of a brushing scam. Brushing scams involve third-party sellers on e-commerce platforms sending fake orders to people and then using those accounts to leave positive reviews for their own products. In this article, we'll take a closer look at the brushing scam, how it works, and what you can do to protect yourself.

What Is a Brushing Scam?

A brushing scam occurs when a seller sends unordered merchandise to someone and then uses their account to leave positive reviews for their own products. The idea is to boost their sales and improve their reputation on e-commerce platforms.

How Does It Work?

Brushing scams typically start with a third-party seller obtaining someone's name and address, often through a data breach or other means. They then create a fake order and send the merchandise to the person, even though they didn't order it.

Once the package is delivered, the seller uses the person's account to leave a positive review for their own product, which can help to increase their sales and reputation on e-commerce platforms.

What Can You Do About It?

If you receive an unsolicited package in the mail, it's important to take action. The first step is to check your account and make sure that no unauthorized charges have been made. You should also contact the seller and inform them that you did not order the merchandise.

In addition, you can report the brushing scam to the e-commerce platform, which can take action against the seller. It's also a good idea to change your passwords and monitor your accounts for any suspicious activity.

Conclusion

Brushing scams are a growing problem on e-commerce platforms, and it's important to be aware of how they work and what you can do to protect yourself. By taking the steps outlined in this article, you can help to prevent brushing scams and keep your personal information and finances secure.

If you've ever received an unsolicited package in the mail, you may have been a victim of a brushing scam.

Phishing and social engineering are two of the most common cyber attacks used by hackers to gain unauthorized access to sensitive information.

Learn why governance and risk management are essential for effective incident response planning. Discover how to protect your data and maintain customer trust.

Learn about the legal aspects of electronic communications and signatures under ECPA and E-Sign Act. Stay compliant with e-commerce regulations.

Learn about the risks of blockchain technology and how to mitigate them. Protect your investments and stay ahead of the game.