Cyber Security News

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to steal Microsoft credentials from unsuspecting employees.

The attack begins with an email, disguised as a “Reward Gateway” message from a victim’s employer, promising a $200 Amazon eGift card as a reward for outstanding performance.

The Phishing Email

The email arrives without any apparent flaws that might raise immediate suspicion.

It features a significant monetary value and a URL purportedly leading to an Amazon gift card redemption page.

Microsoft CredentialsMicrosoft Credentials
Infection Page

The email’s content is crafted to evoke trust and appreciation from the employer, leading the recipient to engage with the provided link in anticipation of receiving their reward.

Once the victim clicks on the link, they are redirected to what appears to be an Amazon gift card redemption site.

However, this website is hosted on a newly created domain, “activationshub[.]com,” with no legitimate connection to Amazon, signaling the first red flag.

The site mimics the real Amazon redemption process, convincing users to enter their email addresses to “unlock” their gift card.

Upon entering their email, victims are then redirected to a nearly indistinguishable replica of the Microsoft login page.

Malicious Email

Hosted on “officefilecenter[.]com,” another recent domain, this page captures Microsoft credentials under the pretense of signing into an Outlook account.

Technical Insights

The phishing infrastructure leverages several technical components:

  • Hosting on Suspicious Domains: Both fraudulent domains were newly registered, which is often a hallmark of malicious activities.
  • Email Spoofing: The attackers spoofed the email to make it appear as if it came from a trusted source within the victim’s organization.
  • URL Manipulation: The URLs used in the emails lead to pages designed to deceive by closely replicating trusted brand interfaces.

According to the Report, this campaign underscores the evolving sophistication of phishing attacks, where attackers exploit human emotions and brand trust to bypass security protocols.

Companies are urged to:

  • Regularly update their phishing awareness training to include such real-world examples.
  • Implement multi-factor authentication (MFA) to add an extra layer of security.
  • Use advanced email filtering systems to detect and quarantine phishing emails before they reach the inbox.

Organizations and individuals alike must stay vigilant, especially when presented with unsolicited rewards or gifts.

Always verify the authenticity of such communications through direct channels with the sender before engaging with any links or entering personal information.

Indicators of Compromise

URLAssociated IP
hXXps://egift[.]activationshub[.]com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdL/104.26.11.204
hXXps://sso[.]officefilecenter[.]com/signin?sso_reload=true#104.26.1.222

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

11 hours ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

11 hours ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

11 hours ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

11 hours ago

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…

11 hours ago

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’

ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…

11 hours ago