Recognize & report fraud

Recognize & report fraud

If you come across suspicious websites that pretend to be FedEx, or if you have received fraudulent emails or text messages, forward them to FedEx immediately.  

If you come across suspicious websites that pretend to be FedEx, or if you have received fraudulent emails or text messages, forward them to FedEx immediately.  

How to recognize fraud

FedEx does not request, via unsolicited mail, text or email, payment or personal information in return for goods in transit or in FedEx custody. If you receive any of these or similar communications, do not reply or cooperate with the sender. If your interaction with the website resulted in financial loss, you should contact your bank immediately. Consider contacting the Internet Crime Complaint Center (IC3) or your state Attorney General’s office.

Common warning signs of mail, text or online scams

FedEx Alert Icon
  • Unexpected requests for money in return for delivery of a package, often with a sense of urgency.
  • Requests for personal and/or financial information.
  • Links to misspelled or slightly altered website addresses (,, etc.)
  • Spelling and grammatical errors or excessive use of capitalization and exclamation points.
  • Claims that you have won a large sum of money in a lottery or settlement.
  • Certificate errors or lack of Secure Sockets Layer (SSL) for sensitive activities.

Top scams

Work at home

While job openings are on the rise, fraudsters are creating counterfeit jobs to entice new victims. Fraudsters create job ads claiming no skills or experience are required. Typically, the job offers high pay for little or no work. The company promises that a business opportunity is surefire and will pay off quickly and easily. You're required to pay upfront for background checks, training, certifications, directories or materials. Be wary of any employment opportunity where you are asked to pay upfront costs or expenses and verify the legitimacy of the organization and job offer. 

Online marketplace fraud

Online shopping has sky-rocketed during the pandemic. Fraudsters are listing merchandise (typically on sites that offer third party selling) at unusually high or low pricing. Customers are provided a tracking number after purchase, but the products will never be delivered, as the fraudsters have used stolen, valid tracking data to legitimize a fake transaction and take the victims money. Be careful of purchasing too good to be true items online.

Grandparent/elder fraud

Everyone knows grandparents are kind-hearted people. Fraudsters know this best. Fraudsters sometimes present themselves` as a relative—usually a child or grandchild -  claiming to be in immediate financial need. Their end goal is to manipulate you out of your hard earned money. Please be aware and touch base with family members to verify a family crisis first, and never ship cash.

Government impersonation scam

Fraudsters pose as government employees and threaten to arrest or prosecute victims unless they agree to provide funds or other forms of payments. Do not give anyone your personal information without verification of legitimacy and never ship cash.

Sweepstakes/charity/lottery scam

Fraudsters claim to work for legitimate charitable organizations to gain victims’ trust. They may even claim their targets have won a foreign lottery or sweepstakes, which they can collect for a “fee.” Carefully inspect the background of any charitable organization before committing to donations or paying any fees. 

Payroll (and other checks) processing

Employees believe they are working for a legitimate company, however fraudsters usually initiate the contact for employment. The fraudster will supply or ask that you purchase check production software and attain a FedEx (or competitor) account number. Details such as bank account info, digital signatures, names/addresses and depositing amounts will be supplied to you. Checks are processed to individuals selling items. Item is sold and a check is written for a value greater than the item value with excess funds being requested to be returned. The check is cashed and the sold item is sent with excess funds. Checks are later deemed fraudulent by bank.

Depositing checks and sending reimbursements via wire or gift cards

In this scheme fraudsters send out checks or money orders, often from an online advertisement or job offer, utilizing a delivery service like FedEx to appear legitimate. You are then instructed to deposit the check and return a portion of the funds using a wire transfer service or through gift cards. You may even be given the opportunity to keep some of the cash as an enticement. Banks later discover that the check is fraudulent and the depositor is held responsible.

Secret shopper

Beware of receiving/money and cashing money orders when signing up to be a mystery shopper. Fraudsters sometimes utilize FedEx to send money orders to “other secret shoppers.” Authentic mystery shopping companies only require you to shop at stores and send feedback about your shopping experience directly to them or through a selected third party service.


Types of fraud

Credit card fraud is a form of identity theft. It is committed when someone uses your card over the internet without your permission. Even though the law protects you against such activities, here are some common warning signs of credit card fraud that can help you protect yourself:

  • Wrong charges on your bank statements.
  • Mistakes on your credit report.
  • A temporary hold placed by your bank on your card or account.

Fraudulent emails are the most common avenue of online scams. Such emails attempt to trick you by pretending to come from a reputable source. They try to get you to share sensitive personal account information or send payment.

Similar to email attacks, links are delivered via instant messaging versus email. They work much like email attacks, where malware is launched when you click on a hyperlink that then links through to a malicious website. The malware can be spread through your IM chat sessions.

Phishing is an email fraud method where the perpetrator sends you a legitimate-looking email in an attempt to gather your personal and financial information. Typically, the messages appear to come from well-known and trustworthy web sites.

Phishing & spoof sites examples

Phishing emails directing users to spoof websites pretend to represent a reputable source, such as FedEx, when in reality they are operated by criminals attempting to commit theft. Spoof websites attempt to collect user names, passwords, Social Security numbers, credit card details and more. Many spoofed sites even allow users to log in, giving them a false sense of security.


Subject: Regarding Your Online Access

From: Online Services
: Regarding Your Online Access

Dear Customer,

Due to Ongoing periodic update on all FedEx account, we advise that you update your account to avoid Suspension .

Please click the link below to update your Account access

Log in to (links to spoof site)

Please note that this link will expire in 48 hours from the time of your e-mail address reset request. After that time, you will need to re-start the process by logging into

Thank you for choosing FedEx.

This message has been sent by an auto responder system. Please do not reply to this message. The content of this message is protected by copyright and trademark laws under U.S. and international law. Review our privacy policy. All rights reserved.


Subject: Pay your Fedex invoice online.

: Pay your Fedex invoice online



You have a new not paid invoice(s) from FedEx that is ready for payment.

The following invoice(s) are to be paid now:


Invoice Number



To pay or review these invoices, please sign in to your FedEx BIlling Online account by clicking on this link:


Note: Please do not use this email to submit payment. This email may not be used as a remittance notice. To pay your invoices, please visit FedEx Billing Online, http://www/

Thank you,

Revenue Services



Subject: ID (k)dbm47-511-511-7465-7465

From: "Shipping Service" <>


Subject: ID (k)dbm47-511-511-7465-7465

Reply-To: "Shipping Service" <>


Order: FD-24762590342635

Dear Customer,

Your parcel has arrived at the post office an November 19. Our postrider was unable to deliver the parcel to your.

To receive a parcel, please, go to the nearest our office and show this postal receipt.

Thank you.

Some phishing scams involve search engines where you are directed to product sites that may offer low-cost products or services. If you enter your credit card information to purchase a product, your information is collected by the phishing site. There are many fake bank websites offering credit cards or loans at a low rate, but they are actually phishing sites.

Smishing is similar to email and IM attacks. Links are delivered to your mobile device via text messaging. In this case, malware is launched when you click on a hyperlink that then links you to a malicious website.

This term describes a non-technical kind of intrusion that relies heavily on human interaction, and often may involve tricking you into breaking normal security procedures or divulging confidential information. The perpetrator may try to appeal to your vanity, authority level and/or greed.

Your company or organization may be targeted in a spearfishing email attack. The spoofing email may request unauthorized access to confidential data.

The telephone version of phishing is vishing. In phone phishing, you may receive a message asking you to call a number. The purpose is to get your personal information, which could be used to access your account or open new credit cards in your name.