Monday, May 19, 2025
HomeAmazonWeaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to steal Microsoft credentials from unsuspecting employees.

The attack begins with an email, disguised as a “Reward Gateway” message from a victim’s employer, promising a $200 Amazon eGift card as a reward for outstanding performance.

The Phishing Email

The email arrives without any apparent flaws that might raise immediate suspicion.

- Advertisement - Google News

It features a significant monetary value and a URL purportedly leading to an Amazon gift card redemption page.

Microsoft Credentials
Infection Page

The email’s content is crafted to evoke trust and appreciation from the employer, leading the recipient to engage with the provided link in anticipation of receiving their reward.

Once the victim clicks on the link, they are redirected to what appears to be an Amazon gift card redemption site.

However, this website is hosted on a newly created domain, “activationshub[.]com,” with no legitimate connection to Amazon, signaling the first red flag.

The site mimics the real Amazon redemption process, convincing users to enter their email addresses to “unlock” their gift card.

Upon entering their email, victims are then redirected to a nearly indistinguishable replica of the Microsoft login page.

Microsoft Credentials
Malicious Email

Hosted on “officefilecenter[.]com,” another recent domain, this page captures Microsoft credentials under the pretense of signing into an Outlook account.

Technical Insights

The phishing infrastructure leverages several technical components:

  • Hosting on Suspicious Domains: Both fraudulent domains were newly registered, which is often a hallmark of malicious activities.
  • Email Spoofing: The attackers spoofed the email to make it appear as if it came from a trusted source within the victim’s organization.
  • URL Manipulation: The URLs used in the emails lead to pages designed to deceive by closely replicating trusted brand interfaces.

According to the Report, this campaign underscores the evolving sophistication of phishing attacks, where attackers exploit human emotions and brand trust to bypass security protocols.

Companies are urged to:

  • Regularly update their phishing awareness training to include such real-world examples.
  • Implement multi-factor authentication (MFA) to add an extra layer of security.
  • Use advanced email filtering systems to detect and quarantine phishing emails before they reach the inbox.

Organizations and individuals alike must stay vigilant, especially when presented with unsolicited rewards or gifts.

Always verify the authenticity of such communications through direct channels with the sender before engaging with any links or entering personal information.

Indicators of Compromise

URLAssociated IP
hXXps://egift[.]activationshub[.]com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdL/104.26.11.204
hXXps://sso[.]officefilecenter[.]com/signin?sso_reload=true#104.26.1.222

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...