Amazon/Amazonitara, Walmart, Netflix, ShareFile - Top scams of the week


We found many scams this week, including those related to Amazon, Walmart, Netflix, and ShareFile. Could you have spotted all these scams?

Amazonitara Scam (Fake Amazon Shopping Site)

Have you come across an online store called Amazonitara(.)com? Many people wonder if it is a scam. Here’s the answer: Yes!

Find the scam_Amazonitara(.)com
Amazonitara(.)com

With the Amazon logo in the header, this website tries to impersonate a real Amazon website. (Note: The official Amazon website URL is amazon.com). Besides the fact that the site uses Amazon’s logo, there are several other red flags:

  • Rather inexplicably, the site’s search bar features the Best Buy logo.
  • The website is very young (created in November 2022).
  • There is no contact phone number (just an email address).
  • There are no reviews.
  • There is no social media presence – other than people warning others about the scam!

Shopping on such a shady website can lead to financial loss and even identity theft as scammers can steal your identity personally identifiable information (PII) (e.g. email address, social security number, credit card number and more). In addition, there is no guarantee if there is any dispute about exchange or refund. Be careful!

Shop safely with Trend Micro Check

To avoid online shopping scams, always do your research and look out for the red flags above. Or you can use a FREE tool to help you fight scams with ease!Trend MicroCheck is a free browser extension and mobile app for detecting scams, phishing attacks, malware and dangerous links. Download it today and surf the web with confidence!

The Trend Micro Check browser extension blocks dangerous websites in real time! (Available on Safari, Google Chrome and Microsoft Edge.)

TMC_CTA_Extension_2022

The Trend Micro Check app automatically detects and filters fraud and spam 24/7. (Available for Android and iOS).

TMC_CTA_Mobile_2022

Cashthis page For more information on Trend Micro Check, click here.

Scammers use a variety of pretenses to pose as trusted brands and like to spread the word phishingLinks via social media, text messages or email – always with the aim of stealing your personal data. You will be prompted to click Attached phishing links to perform various tasks, e.g. B. to verify an account, update billing information or more. These phishing links then lead further to scam/phishing sitesDesigned to record all personal information you submit. Your stolen data can be used by scammers to commit identity theft or other crimes:

Amazon phishing text

Besides fake shopping sites, Amazonalso commonly used in phishing attempts. This week, scammers sent fake security notifications to urge people to “Restore Access” via the scam link:

  • Amazon: Suspicious activity has been detected on your account, which has resulted in its temporary suspension. Verify your identity to restore access at

If you click on the attached link, you will be redirected to a fake Amazon login page that closely resembles the legitimate one. Any credentials you enter here will end up in the hands of scammers. Danger!

Discover the scam_Amazon_Phishing_Fake Login Page_20230512
Fake Amazon login pages

This week we spotted many fake Walmart refund notification texts:

  • Walmart Refund Notification

If you fall for it and click on the link, it will take you to a fake survey page stating that you can win expensive electronic products by completing the questionnaire:

Discover the scam_Walmart_Phishing_Fake Survey Page_20230512

Finally, the page will ask for your login details, including your name, address, and credit card information. Scammers use all data for their own benefit – don’t let this happen!

Spot the Scam_Walmart_Phishing_Fake Survey Page_2_20230512

Netflix Membership SMS Scam

In the last week we have detected over 3,000 cases of it Netflix scamText message incorrectly claiming that you need to update your account payment information:

  • Your Netflix membership will be suspended. We’re having trouble with your current billing information. To use your account as usual, please follow the instructions by clicking on the link below: Netflix Services

Once you click it, the attached link will take you to a copycat version of the real Netflix website like the one below. Again, all the information entered there is accessible to the scammers!

Netflix scam site
Example of fake Netflix login website

ShareFile “Secure Email” phishing

Scammers also like to use email to trick people. Under the pretense of sending some attachments via ShareFile, scammers have embedded links to fake ShareFile login pages to trick you into clicking them:

Discover the Scam_ShareFile_Phishing Email_20230512
Detect the scam_ShareFile_Phishing Email_Fake Login_20230512
Example of a fake ShareFile login page

The tricky part is that the login page is designed to look 100% identical to the real thing – right down to the legitimate Microsoft URL at the top of the window. Despite being a legitimate URL, the address bar itself is fake – it’s just an image and part of the overall design of the page.

Detect the scam_ShareFile_Phishing Email_Fake Login_Microsoft_20230512
Example of a fake ShareFile login page

Tips to protect against fraud

  • Double check the sender’s mobile number/email address. Even if it seems legitimate, think twice before taking any action.
  • Free gifts are a red flag.
  • Only use official websites/applications. Never click on dubious links! (UseTrend MicroCheck)
  • Get notified with Trend MicroID protectionif your personal data is lost.
  • Finally, add an extra layer of protection for your devices with Trend MicroHighest security. Web threat protection, ransomware protection, anti-phishing and anti-spam protection will help you fight fraud and cyber attacks.

If you found this article interesting and/or helpful reading, to help keep the online community safe and secure, please SHARE it with friends and family. Also, please consider leaving a comment or a like below.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *