Friday, May 9, 2025
HomeAmazonWeaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to steal Microsoft credentials from unsuspecting employees.

The attack begins with an email, disguised as a “Reward Gateway” message from a victim’s employer, promising a $200 Amazon eGift card as a reward for outstanding performance.

The Phishing Email

The email arrives without any apparent flaws that might raise immediate suspicion.

- Advertisement - Google News

It features a significant monetary value and a URL purportedly leading to an Amazon gift card redemption page.

Microsoft Credentials
Infection Page

The email’s content is crafted to evoke trust and appreciation from the employer, leading the recipient to engage with the provided link in anticipation of receiving their reward.

Once the victim clicks on the link, they are redirected to what appears to be an Amazon gift card redemption site.

However, this website is hosted on a newly created domain, “activationshub[.]com,” with no legitimate connection to Amazon, signaling the first red flag.

The site mimics the real Amazon redemption process, convincing users to enter their email addresses to “unlock” their gift card.

Upon entering their email, victims are then redirected to a nearly indistinguishable replica of the Microsoft login page.

Microsoft Credentials
Malicious Email

Hosted on “officefilecenter[.]com,” another recent domain, this page captures Microsoft credentials under the pretense of signing into an Outlook account.

Technical Insights

The phishing infrastructure leverages several technical components:

  • Hosting on Suspicious Domains: Both fraudulent domains were newly registered, which is often a hallmark of malicious activities.
  • Email Spoofing: The attackers spoofed the email to make it appear as if it came from a trusted source within the victim’s organization.
  • URL Manipulation: The URLs used in the emails lead to pages designed to deceive by closely replicating trusted brand interfaces.

According to the Report, this campaign underscores the evolving sophistication of phishing attacks, where attackers exploit human emotions and brand trust to bypass security protocols.

Companies are urged to:

  • Regularly update their phishing awareness training to include such real-world examples.
  • Implement multi-factor authentication (MFA) to add an extra layer of security.
  • Use advanced email filtering systems to detect and quarantine phishing emails before they reach the inbox.

Organizations and individuals alike must stay vigilant, especially when presented with unsolicited rewards or gifts.

Always verify the authenticity of such communications through direct channels with the sender before engaging with any links or entering personal information.

Indicators of Compromise

URLAssociated IP
hXXps://egift[.]activationshub[.]com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdL/104.26.11.204
hXXps://sso[.]officefilecenter[.]com/signin?sso_reload=true#104.26.1.222

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...