Hoplon InfoSec
20 Apr, 2025
Are you aware of the recent Amazon Gift Cards Scam? In recent months, cybercriminals have honed a new and insidious phishing campaign that preys on the widespread use of digital gift cards. By masking malicious links inside seemingly legitimate Amazon gift card notifications, these attackers have found a highly effective way to trick unsuspecting users, particularly corporate employees, into revealing their Microsoft credentials. In this post, we’ll explore the anatomy of this scam, explain why it works so well, and provide actionable guidance on how to recognise, prevent, and respond to such attacks.
Gift card phishing is a form of social engineering that exploits the appeal of free or bonus gift cards. Rather than relying purely on fear or urgency (as many phishing attempts do), this tactic dangles a reward in front of the victim. Attackers send emails claiming the recipient has earned a digital gift card, often from a trusted brand like Amazon, and then direct them to a fake site designed to harvest their login credentials.
Microsoft 365 accounts are a prime target for attackers for two main reasons. First, many organisations use Microsoft’s cloud services (including Exchange Online, OneDrive, and Teams) to store sensitive data and manage communications. Second, once an attacker obtains valid Microsoft credentials, they can move laterally within an organisation’s network, accessing confidential documents, hijacking email threads, or deploying malware. By combining a reward-based lure with a counterfeit Microsoft login page, attackers maximise their odds of success.
Appreciating the sophistication of this campaign helps break down each stage of the attack.
At the outset, victims receive an email that looks nearly indistinguishable from an official Amazon notification. Key characteristics include:
Because many companies award digital gift cards for employee recognition, the email aligns with recipients’ expectations, lowering their guard.
Traditional email filters are tuned to flag overtly malicious content, such as attachments with known malware signatures or links to blocked domains. In this campaign, attackers use newly registered domains that mimic legitimate service domains like gifts. Activation hub.com makes it harder for security systems to recognise them as malicious. Early April 2025 reporting by Cofense researchers confirms that these emails routinely slip past standard gateways, especially in corporate environments where digital rewards are commonplace.
When the user clicks “View My eGift Card,” they are taken to a landing page that imitates Amazon’s gift card redemption interface. Here, the user must enter their email address to “unlock” the card. This seemingly harmless step serves two purposes:
Once the email is submitted, the victim is redirected to the final phishing stage.
The landing page then seamlessly transitions to a counterfeit Microsoft sign‑in portal hosted at sso.officefilecenter.com. This page is a pixel‑perfect clone of the real Microsoft 365 login screen, complete with identical styling, input validation, and logos. The only subtle giveaway is the domain registered less than a month before the campaign, which many users overlook due to their eagerness to claim the gift card.
Attackers have invested considerable effort into replicating every visual element of both Amazon and Microsoft interfaces. From exact colour palettes to button shapes and error messages, the copycat pages leave a few clues that something is amiss.
Once credentials are entered, they are immediately harvested by the attackers, often in real-time. In many cases, the attackers then attempt to log in to corporate Microsoft accounts right away, accessing sensitive emails, SharePoint sites, and OneDrive repositories before victims even realise they’ve been compromised.
Corporate users are more likely to receive legitimate digital rewards and have fewer restrictions on clicking external links. Plus, workplace culture often emphasises quick responsiveness to management communications, increasing the chances that employees will click without pause.
Although the scam is highly polished, several indicators can help you spot a gift card phishing attempt:
Always inspect the full domain name in the browser’s address bar before entering credentials.
If you did not apply for or expect a reward, treat the email with suspicion. Confirm with your manager or HR department before clicking any links.
Genuine gift card systems rarely require you to re‑enter an email address to “unlock” a gift. Be wary whenever an extra step seems unnecessary.
Although this campaign is well‑designed, minor language errors or awkward phrasing can sometimes slip through.
Organisations and individuals can take proactive measures to reduce the risk of falling victim to gift card phishing.
If you believe you’ve entered credentials on a fraudulent site, act immediately:
Gift card phishing represents a shift in attacker strategy, combining financial incentives with trusted brands to bypass both human and technical defences. As organisations increasingly adopt digital rewards for employee engagement, attackers will continue to exploit this channel. By understanding the multi‑stage nature of these scams and implementing robust preventive measures, both individuals and organisations can stay one step ahead.
Share this :