WHAT is FedEx Tracking Scam — How to Remove It
THREAT REMOVAL

WHAT is FedEx Tracking Scam — How to Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

This article has been created to help you understand what is the FedEx Tracking Scam scam page and what is the “virus” app causing such pages to appear and how to remove it entirely.

FedEx Tracking Scam is a part of the FedEx related phishing tactics. Such malware threats often lead to hacker-controlled sites or cause other type of virus infections. They can be updated over time adding in various new malicious tactics.

Threat Summary

NameFedEx Tracking Scam
TypeBrowser Hijacker/PUP/Email Scam
Short DescriptionAims to get you to type in and giveaway your financial or personal details in a fake Netflix phishing scam.
SymptomsThe intended targets will receive email messages that pose as being sent by the streaming company.
Distribution MethodBundled downloads. Web pages which may advertise it.
Detection Tool See If Your System Has Been Affected by FedEx Tracking Scam

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss FedEx Tracking Scam.

FedEx Tracking Scam – Distribution Methods

The FedEx Tracking Scam is primarily delivered through email phishing campaigns which pose as legitimate notifications that have been sent in by the courier company. Most of them use the same design layout and text contents as the real FedEx ones and the only to tell that they are a scam is to look at the senders address and check if they are properly signed. In this particular example the victims is shown a message that convinces them that they have received a parcel and in order to receive it they need to acquire a shipment label. This will link to a hacker-controlled page where personal details will be requested. The shipment label site may require the visitors to enter in their FedEx related credentials, personal information or to register to a fake service login page. By mistyping or visiting similar sounding domain names the users can fall victim to the threats. Many of them will feature self-signed security certificates in order to coerce the visitors that they are safe to visit.

While these two methods are the most popular ones it is possible to infect users by crafting malicious payloads that contain the virus installation infection code. This can happen by creating application installers that include malware code in them. The hackers typically focus on the most popular software — the original files are taken from their official sources and modified accordingly. The other type is the macro-infected document where the most popular types can be affected: text documents, spreadsheet, databases and presentations. As soon as they are opened by the victims a prompt will appear asking them to enable the macros in order to correctly view the contents of the files.

FedEx Tracking scam related files can be distributed over file-sharing networks like BitTorrent where both pirate and legitimate content is shared.

Browser hijackers as dangerous plugins for the most popular web browsers which can be acquired mainly by downloading extensions from the relevant repositories. The hackers will use fake developer credentials and user reviews to coerce the visitors into believing that they will enhance their application.

FedEx Tracking Scam – More Information

The main goal of the FedEx Tracking Scam is to manipulate the targets into believing that they need to visit the given link. It will lead them to a hacker-controlled page that may present one of the following cases:

  • Fake FedEx Login Page — The criminals in the most popular case will construct fake FedEx related sites which will request the users credentials to the platform or personal information. This can be used both for identity theft and financial abuse.
  • Hacker-Controlled Sites — When browser redirects are installed on the victim systems in many cases the users may also be constantly directed to a certain hacker-controlled page or a network of such sites. They will track their interaction using cookies and will constantly send in that information to the controllers. The collected information can be stored in databases and sold to interested parties.
  • Intrusive Web Elements — Another type of malicious elements which can be delivered to the victims are various pop-ups, banners and ad networks. This is once again caused by browser hijackers.

Advanced versions can also deploy other malicious threats and cause a variety of dangerous actions. This is especially true if it contains an engine which is capable of downloading and launching modules of its own.

Common tactics used by such infections is to harvest sensitive information that can acquire both information about the victim users themselves and the machines. This is used in order to blackmail the victims or to carry out various identity theft crimes and financial abuse. The machine information is used by an algorithm in order to generate an unique victim ID which is assigned to each affected computer.

Related:
The FedEx Parcel Scam is a malware infection that is being spread on the Internet by unknown computer hackers, read more about in our removal guide
FedEx Parcel Scam: How to Remove Active Infections

FedEx Tracking Scam files can also lead to a security bypass function — it will search the memory processes and hard disk content for any anti-virus programs, firewalls, virtual machine hosts and sandbox environments.

Any additional components can be integrated with subsequent attack campaigns.

Remove FedEx Tracking Scam Fully

If you want to remove the FedEx Tracking Scam redirect, you are welcome to follow the removal instructions down below. They are made to help you delete the files of this unwanted software either manually or automatically from your machine. If the first two removal steps do not seem to work and you keep seeing redirects to pages like FedEx Tracking Scam, then we would strongly suggest that you use a professional anti-malware software, since such program aims to scan for and delete all malicious files and redirect-causing objects from your machine and also ensure that your system remains protected against intrusive apps in the future as well.

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...