Beware! How the $100 Amazon Gift Card Scam Steals Your Data

Have you seen ads popping up claiming you can get a $100 Amazon gift card? While these offers seem tempting, they are often a scam designed to steal your personal information and money. This article will explain everything you need to know about the $100 Amazon gift card scam, including how it works, how to protect yourself, and what to do if you have fallen victim.

Overview of the $100 Amazon Gift Card Scam

The $100 Amazon gift card scam typically starts with an online ad stating you can get a free $100 gift card. The ads appear on social media sites, shady websites, and even legitimate websites through malicious ads.

The scam ads often say things like:

  • Congratulations Amazon User! Get a $100 Amazon Gift Card!
  • Amazon User You are selected to receive a $100 Amazon Gift Card!
  • Amazon shoppers get a free $100 Gift Card!

Some of the common claims in the scam ads include:

  • You have been specially selected to receive a $100 Amazon gift card.
  • All you need to do is take a short survey to get your gift card.
  • You can get the $100 gift card by clicking a link or sharing the offer with friends.

The goal is to get you to click on the link in the ad, which sends you to a fake website. The scam sites are designed to look like official Amazon pages with logos and branding.

Once you arrive at the site, you are prompted to take a “short survey” to claim your gift card. The survey starts innocently enough, asking basic questions about age, gender, Amazon shopping preferences, etc.

Amazon Scam

Then the questions get more detailed and personal—asking for your name, email, home address, phone number, credit card details, and more. Your sensitive information is harvested under the guise of a survey.

In some cases, the survey even asks you to login to your Amazon account to “verify” your identity. If you provide this info, the scammers gain access to your Amazon login credentials.

After the survey, you are told you need to complete one more “offer” to get the $100 gift card. This usually means signing up for a sketchy service, subscription, or downloading malware disguised as an Amazon app.

Of course, after completing all the steps—you never receive a gift card. The whole thing is a scam designed to steal your personal information and money.

How the $100 Amazon Gift Card Scam Works

Here is a step-by-step breakdown of how the $100 Amazon gift card scam operates:

Step 1) Scam Ads Lure Victims

The scam starts with fake ads designed to look like real offers from Amazon. Using images and branding identical to Amazon, the ads tout free $100 gift cards.

Common places you may encounter these scam ads include:

  • Social media sites like Facebook, Instagram, Twitter
  • Shady websites (illegal streaming sites, piracy sites, sketchy blogs, etc.)
  • Malicious ads on otherwise legitimate websites
  • Pop-up ads and banners on various sites
  • Spam email campaigns

The scam ads are often targeted based on your browsing history and Amazon shopping patterns. For example, if you visit Amazon frequently or have recently made purchases, you are more likely to get targeted.

Scammers use “typosquatting” to register domains that are similar to Amazon and lure victims. For example, instead of amazon.com, it might be amason.com or amazun.com.

Step 2) Victims Sent to Fake Websites

When you click on the link in the scam ad, you are sent to a fraudulent website dressed up to look like Amazon. The site has the Amazon logo prominently displayed along with the standard color scheme and web design.

You land on a page stating you have been selected to receive a $100 Amazon gift card. All you need to do is take a short survey to claim the offer.

These fake sites utilize malicious scripts and trackers to harvest data about victims. As you take the survey, it captures information about your device, location, Amazon browsing, and shopping patterns.

Step 3) Personal Info Harvested Through Survey

The survey starts by asking basic questions about age, gender, Amazon shopping preferences and habits. This allows them to refine their targeting for maximum effectiveness.

Next, the survey requires you to enter personal details—name, home address, phone number, email, and more. When you get to the end, it asks for credit card information to “verify” your identity.

If you provide this sensitive information, the scammers immediately harvest it to commit identity fraud and steal your money.

In some cases, they ask you to login to your Amazon account through their fake site. This grants them direct access to your Amazon credentials.

Step 4) Complete an “Offer” to get the Gift Card

After completing the survey, you are told there is just “one more step” before getting your $100 Amazon gift card. This usually involves:

  • Downloading a fake anti-virus or PC optimization program (malware in disguise)
  • Signing up for subscription services (like a PDF editor or ebook service)
  • Taking more surveys that require personal info
  • Calling scam phone numbers that charge excessive fees

You must complete one of these “offers” before getting your gift card—which of course never arrives. The offers ensure scammers earn more money from each victim.

Step 5) Scammers Profit Off Stolen Data and Fraud

Once the scammers have your personal information, they leverage it in various ways:

  • Selling your details on the dark web to identity thieves
  • Using your credit card for fraudulent purchases
  • Accessing your Amazon account to make purchases using your saved payment method
  • Signing up for premium subscriptions in your name
  • Taking out loans or lines of credit under your identity

The sensitive data harvested through this scam enables a variety of fraud—all while you wait for a $100 Amazon gift card that never arrives.

What to Do If You Fell For the Amazon Gift Card Scam

If you submitted personal information through this scam, here are important steps to take right away:

1. Contact your bank and credit card companies.

Alert them that your financial information may have been compromised. Watch for any suspicious charges and work with them to block fraudulent activity. Request new card numbers if needed.

2. Change your Amazon password immediately.

If you logged into your Amazon through a fake site, change your password right away. Enable two-factor authentication for added security.

3. Scan your devices for malware.

If you downloaded anything, scan your computer for viruses and malware. Wipe your device and reinstall software if infected.

4. Place a fraud alert and monitor your credit reports.

Contact one of the three credit bureaus to place an initial 90-day fraud alert. Also, check your credit reports regularly for any suspicious activity.

5. Report identity theft to the FTC.

File a complaint with the Federal Trade Commission if your identity is stolen after falling for this scam. This helps law enforcement track scams.

6. Close any compromised accounts.

If scammers now have access to your Amazon, email, or other accounts, close them immediately. Open new accounts with fresh passwords.

7. Beware of recovery scams.

You may get contacted by scammers posing as Amazon support claiming they can recover your lost money. Never give them remote access or payment.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About the $100 Amazon Gift Card Scam

1. How does the $100 Amazon gift card scam work?

The scam begins with an ad offering a free $100 Amazon gift card. If you click through, you are taken to a fake website dressed up to look like Amazon. You are prompted to take a survey and enter personal details to claim your “prize.” After completing the survey, you are told to finish an “offer” like downloading malware or signing up for a sketchy subscription. The scammers use your data for identity theft and profit from the ads and offers. Victims never receive a gift card.

2. What are some common claims in the $100 Amazon gift card scam ads?

Some typical claims are that you’ve been “specially selected” to receive a $100 gift card, you just need to take a short survey, or you can get the card by clicking a link or sharing with friends. The goal is to get you to a fake website to harvest your personal information.

3. What types of info do the scammers gather in the survey?

The survey starts by asking basic questions about age, gender, Amazon shopping habits. Then they ask for sensitive details like your name, home address, email, phone number, credit card number. In some cases, you are prompted to login to your Amazon account through their fake site.

4. What happens after completing the survey?

After the survey, you are told you must complete “one more offer” to get your gift card. This usually involves downloading malware, signing up for shady subscriptions, taking more surveys, or calling scam phone numbers. Of course, you never get a gift card.

5. What do scammers do with your personal info?

Scammers sell your details online to identity thieves. They use your credit card for fraudulent purchases. They access your Amazon account to make purchases. They open loans or credit cards under your name. Your data enables a variety of fraud.

6. How can you identify the $100 Amazon gift card scam?

Look for too-good-to-be-true offers. Fake sites use Amazon logos and branding but slightly altered URLs. Surveys that ask for financial details are a red flag. Claims that you must complete another “offer” before getting a prize indicate a scam.

7. What should you do if you shared your information through this scam?

Contact your bank and credit card companies to block fraudulent charges. Change your Amazon password immediately and enable two-factor authentication. Scan devices for malware. Place a fraud alert and monitor your credit reports. Report identity theft to the FTC.

8. Are there any legitimate reasons Amazon would ask for your personal information?

No, Amazon will never ask for your sensitive details like credit card information or login credentials through an online ad, survey or questionable website. Legitimate Amazon giveaways don’t require you to complete multiple steps to get a gift card.

9. How can you protect yourself from the $100 Amazon gift card scam?

Avoid clicking on random links and ads. Don’t provide info to unfamiliar sites. Use two-factor authentication on your accounts. Monitor your credit and bank statements regularly. Learn to recognize the common signs of a scam involving Amazon. Only enter info at amazon.com.

10. What should you do if you receive a recovery scam call after falling victim?

You may get calls claiming to be Amazon and offering to recover lost money. These are scammers trying to take more money from you. Never give remote access to your devices or make any payments to someone claiming to help. Contact Amazon customer service directly through their official website.

The Bottom Line

The $100 Amazon gift card scam is designed to steal your personal information and money through tempting, but fraudulent, offers. Protect yourself by learning to spot the scam ads, websites, and surveys. Never give your sensitive info to unfamiliar sites.

If you did fall victim, take action right away to minimize the damage. Alert financial institutions, place fraud alerts, monitor your credit, and change compromised credentials. Don’t trust any unsolicited contacts claiming to help recover lost money.

Stay vigilant about scams mentioning Amazon to avoid falling for this prevalent fraud. Remember, if it seems too good to be true, it usually is. Legitimate giveaways from Amazon will never ask for financial details or account logins. When in doubt, contact Amazon customer service directly through their official website.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment