Vacant Property Mail Interception: How Threat Actors Convert Drop Addresses Into Fraud Infrastructure

Overview

Research published by Flare exposes a fraud methodology in which threat actors register vacant residential and commercial properties as mail drop addresses to intercept physical correspondence and exploit postal service delivery mechanisms. The technique enables identity fraud, financial account takeover, and document theft at scale, targeting individuals and institutions that rely on physical mail for sensitive communications.

Who Is Affected and What Was Exposed

Flare's research does not describe a single discrete breach with a defined victim count. Instead, it documents a systemic abuse vector affecting any individual or organization whose sensitive mail — bank statements, government documents, credit card deliveries, tax correspondence, and identity verification letters — is routed to an address that bad actors have registered or claimed control over.

The exposed data categories include:

  • Personally Identifiable Information (PII): Full legal names, dates of birth, Social Security Numbers on mailed documents
  • Financial instrument data: Credit and debit cards mailed to new cardholders, account statements, wire transfer confirmations
  • Government-issued credentials: Driver's license renewals, Medicare and Medicaid cards, IRS correspondence
  • Authentication material: One-time password letters, account verification codes sent via physical mail by financial institutions and government agencies

Any individual whose mail is routed through a compromised drop address is at risk. High-density urban areas with high residential turnover and foreclosed or bank-owned properties represent elevated-risk zones based on the described methodology.

Attack Vector

The technique chains several abuse primitives together into a functional fraud pipeline.

Step 1 — Address Registration: Threat actors identify vacant properties through public foreclosure records, real estate listings, or physical reconnaissance. They submit a United States Postal Service (USPS) Change of Address (COA) form — either physically or via the USPS online portal — redirecting mail from a target's legitimate address to the vacant property. The USPS online COA process requires only a credit card charge of $1.10 for identity verification, which attackers bypass using stolen card data or prepaid cards linked to synthetic identities.

Step 2 — Identity Fabrication: Synthetic identities built from a combination of real and fabricated PII are used to establish apparent residency at the drop address. Flare documents how fraud actors purchase or manufacture supporting documentation — utility bills, lease agreements — on dark web marketplaces and Telegram channels to reinforce the fraudulent address claim.

Step 3 — Mail Harvesting: Once the COA redirect is in place, the threat actor either physically retrieves mail from the vacant property or coordinates with a local accomplice acting as a reshipping mule. Intercepted mail yields raw PII, financial credentials, and authentication tokens.

Step 4 — Downstream Fraud Execution: Harvested data feeds account takeover (ATO) operations, new account fraud (NAF), tax refund fraud, and benefits fraud. Physical cards intercepted in transit are immediately usable for card-present transactions and ATM withdrawals before the legitimate account holder reports non-receipt.

Flare's analysis highlights that fraud rings operating this methodology maintain lists of viable drop addresses, rotating through vacant properties to avoid pattern detection by postal inspectors. Some operations use purpose-registered LLCs with virtual office addresses as a cleaner alternative that is harder to tie to a specific individual.

Operational Security Failures That Enable This Vector

The USPS COA process has documented weaknesses. The $1.10 verification charge does not confirm the requester's identity against any authoritative database. USPS does send a Move Validation Letter to both the old and new address after a COA is submitted, giving legitimate residents a 10-day window to identify unauthorized redirects — but this control fails entirely when the original address is vacant or when the account holder does not monitor mail closely.

Financial institutions and government agencies that send authentication material or financial instruments via physical mail without layered out-of-band verification compound the exposure. Mailing a new credit card to an address without requiring in-person pickup or digital confirmation creates a dependency on postal security that this fraud vector directly undermines.

What Affected Users and Security Teams Should Do

Individuals:

  • Enroll in USPS Informed Delivery at informeddelivery.usps.com to receive daily email digests of incoming mail. An unauthorized COA will appear as a discrepancy between expected and received items.
  • Place a USPS Mail Hold or use a P.O. Box for sensitive financial and government correspondence.
  • Register a USPS.com account to lock your address against unauthorized online COA submissions — a registered account adds an authentication layer the paper form bypasses.
  • Monitor credit reports via AnnualCreditReport.com and place a security freeze at Equifax, Experian, and TransUnion if unauthorized address changes are suspected.
  • File a complaint with the USPS Postal Inspection Service (postalinspectors.uspis.gov) immediately upon discovering an unauthorized redirect.

Security Teams and CISOs:

  • Flag mailed authentication tokens (OTP letters, card mailers) as a weak link in identity verification chains. Supplement or replace physical mail verification with digital out-of-band channels.
  • Include physical mail interception in threat models for account onboarding and recovery workflows.
  • When evaluating third-party identity verification vendors, confirm whether address validation includes vacancy and COA fraud screening. Vendors such as Melissa Data, LexisNexis Risk Solutions, and Experian Precise ID offer address risk scoring that flags high-velocity COA activity and vacant property status.
  • Monitor dark web sources and Telegram fraud channels for mentions of your organization's card BINs or mailed credential programs appearing in drop address trade listings — a use case directly supported by platforms like Flare.

Fraud and Risk Teams:

  • Treat non-receipt reports for newly issued cards or documents as a potential drop address indicator, not simply a fulfillment failure.
  • Cross-reference customer-provided addresses against USPS vacant property and COA velocity databases before dispatching sensitive mail.
  • Implement stepped-up authentication for any account where the mailing address has changed within the prior 30 days.