Don’t Get Scammed by Fake Tesco Product Reviewer Offers

Have you seen ads on social media or texts on WhatsApp and Telegram promising easy money as a “Tesco Product Reviewer”? Don’t fall for it – it’s a scam designed to trick you into signing up for unwanted services, downloading malware, and buying overpriced products.

Tesreviewer.com scam

Overview of the Tesco Product Reviewer Scam

The Tesco Product Reviewer scam operates by directing victims to fake websites that mimic the look and feel of the real Tesco website. These scam sites advertise a way to earn gift cards and cash by reviewing Tesco products.

To apply, victims are instructed to click a “Get Yours” or “Get Started” button, which leads to a form asking for your email address and other personal details. After submitting your information, you are redirected to various shady websites and asked to complete surveys, download apps, or purchase products and services.

Despite promises of easy money for product reviews, there is no such job opportunity with Tesco. The scammers register you for unwanted, recurring subscriptions and services designed to extract as much money from victims as possible. Many people end up spending far more than they would ever earn from the fictional review tasks.

How to Recognize the Tesco Review Scam

The scam sites use the Tesco logo and color scheme to appear credible at first glance. However, upon closer inspection, several red flags indicate the site’s fraudulent nature:

  • The domain name does not match the official Tesco website (tesco.com) and often includes the words “review” or “tester”. Common examples include tes-reviewer.com, tescoreviews.com, and tescotester.co.uk.
  • Poor grammar, spelling mistakes, and awkward phrasing in the text.
  • Stock photos of people holding gift cards instead of real Tesco employees.
  • Claims that seem too good to be true, like “Earn £1000 per week!”
  • Links to unfamiliar domains instead of tesco.com.
  • No physical address, company registration, terms of service, or other official business details on the site.

Any job opportunity claiming you can make easy money testing products for Tesco or writing reviews is a scam. Tesco does not hire random people online for this type of work.

How the Tesco Product Reviewer Scam Works

While scammers may change their domain names often to avoid blacklists, the general scam process follows the same pattern:

Step 1: Victims Encounter Scam Ads or Messages

Scam ads promoting the fake Tesco job opportunity frequently appear on social media sites like Facebook, Instagram, and TikTok. The ads seem legitimate at first glance, using Tesco’s logo and photos of gift cards or happy people.

Scammers also spam messages via WhatsApp, Telegram, SMS text messaging, and other platforms. The messages state that Tesco is hiring product testers and provide a link to the fraudulent site.

Step 2: Victims Input Personal Information

After clicking the link, victims arrive at the scam website and are greeted with details about the fictional product testing program. To “apply”, they are instructed to click a button such as “Get Started” or “Get Yours”.

This leads to a form asking for the victim’s name, email address, phone number, home address and other personal details. Victims provide this information believing they are applying for a Tesco job.

Step 3: Redirect to Shady Sites

Once submitted, the victim’s details are captured by the scammers. The victim is then redirected from the fake Tesco site to various survey, offer, and download sites.

These third-party sites have paid the scammers to send traffic and signups their way. They make money by getting victims to complete subscription signups, download malware-infected apps, purchase overpriced products, and more.

Step 4: Complete Offers and Downloads

To receive the promised gift cards or cash rewards, victims are told they must first complete a number of “tasks” like:

  • Take paid surveys
  • Sign up for suspect free trials or monthly subscriptions
  • Download specific mobile apps, games, and software
  • Make purchases for products, gift cards, or services
  • Provide more personal details for data harvesting
  • Watch videos or click ads

The scammers earn affiliate commissions, fees, or buyer information every time victims complete an offer. The third-party sites also profit when victims forget to cancel the recurring subscriptions.

Step 5: No Rewards Provided

After completing several tasks, it quickly becomes clear that no Tesco job or rewards exist. Victims who request their promised gift cards receive messages asking them to complete more offers to unlock the non-existent rewards.

Meanwhile, scammers have already profited from the victim’s personal data, downloads, purchases, and subscriptions. Even if you complete every task demanded, you will never receive gift cards or cash from these scams.

What to Do If You Fell For the Tesco Reviewer Scam

If you submitted personal details or completed questionable offers related to a Tesco Product Reviewer job opportunity, take the following steps right away:

Cancel Recurring Subscriptions and Services

Act fast to cancel any ongoing subscription services, free trials, or recurring payments signed up for through the scam site. Don’t forget magazines, software, phone services, and other monthly memberships. Cancel immediately to avoid being charged.

Scan Your Device for Malware

If you downloaded any apps or software during the scam process, scan your computer or mobile devices for malware, viruses, adware, and spyware. Use security software like Norton, Malwarebytes, or BitDefender to remove dangerous infected files.

Monitor Your Accounts

Closely monitor bank and credit card statements for any fraudulent or unauthorized charges. Also watch for misuse of stolen personal information like your government ID, address, or date of birth. Sign up for credit monitoring if concerned.

Reset Passwords

Change passwords on all online accounts, especially if you used the same password during the scam. Enable two-factor authentication wherever possible as an extra layer of security on key logins.

Contact Banks and Credit Bureaus

If you suspect financial fraud like stolen card numbers, contact your bank and credit bureaus right away. Freeze your credit reports if necessary to prevent scammers from opening new accounts in your name.

Report the Scam

To help warn others, report the Tesco Product Reviewer scam to the FTC and ActionFraud. Provide website details, screenshots, offer details, and any other evidence you collected.

By acting quickly, you can minimize damage, secure your accounts, remove malware, and avoid recurring charges from the scam. Don’t feel bad if you fell for it – these schemes are designed to deceive.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions about the Tesco Product Reviewer Scam

1. What is the Tesco Product Reviewer scam?

The Tesco Product Reviewer scam is a fraud designed to steal personal information and money from victims under the false pretense of a job opportunity with Tesco. Scammers create fake websites mimicking Tesco’s branding and claim to offer easy product testing and review tasks in exchange for gift cards or cash rewards. However, it’s a scam and there is no job – victims end up paying more in unwanted subscriptions and services than any supposed rewards.

2. How does the Tesco Product Reviewer scam work?

The scammers post online ads or send spam messages promoting a lucrative Tesco job offer and a link to their fake site. Victims input personal details thinking they are applying for the job, but are actually giving their info directly to scammers. Victims get redirected to shady third-party sites and told to complete offers like paid surveys and subscription signups to receive their “rewards.” Scammers earn affiliate fees and harvest data, while victims end up losing money.

3. What are some red flags of the Tesco Reviewer scam sites?

Red flags include non-Tesco domains, poor grammar/spelling, unrealistic earnings claims, stock photos instead of real employees, links to unfamiliar sites, and lack of official business details. Tesco does not hire random online applicants for these roles. Avoid any site offering easy money for product testing or reviews.

4. What should I do if I shared my information or completed offers?

Act quickly to cancel any monthly subscriptions, scan devices for malware if you downloaded anything, monitor financial accounts for fraud, change passwords, and contact banks about suspicious charges. Report the scam to authorities to help warn others avoid being victimized.

5. How can I avoid the Tesco Product Reviewer scam?

Avoid sharing personal details or clicking links in unsolicited messages. Verify unfamiliar companies are legit before providing info. Watch for warning signs like upfront fees, urgent calls to act fast, and offers too good to be true. Sign up for credit monitoring and enable two-factor authentication to protect yourself from fraud.

6. Does Tesco really offer Product Reviewer jobs?

No, Tesco does not hire random people who apply online for product testing and review jobs. Any site offering easy payments to review Tesco items is a fraudulent scam. Tesco does not partner with third parties for this type of work. Be wary of anyone claiming you can make fast money reviewing products for major retailers.

7. Where can I report the Tesco Reviewer scam?

Notify the FTC and ActionFraud about scam websites, ads, or messages related to fake Tesco jobs. Provide as many details as possible like screenshots and offer instructions so they can investigate the scammers and warn other potential victims. Reporting frauds helps prevent more people from falling prey.

The Bottom Line on the Tesco Product Reviewer Scam

The Tesco Product Reviewer scam preys on innocent people looking to earn extra income online. Scammers rely on the trusted Tesco brand name to trick victims into providing personal details and completing dubious offers.

Remember – Tesco does NOT hire random people online to test products or write reviews. Any job opportunity promising easy money in exchange for an upfront “registration fee” or personal details is a fraud.

Protect yourself by learning to spot the warning signs of a scam website or job offer:

  • Unrealistic promises of high earnings for simple tasks
  • Requests for personal information like bank accounts or ID numbers
  • Poor grammar and spelling mistakes
  • Links leading away from the real company’s website
  • High-pressure tactics telling you to act fast

If you come across a deal that seems too good to be true, proceed with extreme caution. Search online to verify the company’s reputation before providing any sensitive information. Avoid clicking links or downloading software from unfamiliar sites to keep your devices malware-free.

With vigilance and awareness, you can avoid falling prey to Tesco Reviewer scams and other online job frauds using trusted brands as bait. Only provide your details directly to legitimate, established businesses you can independently verify. Don’t let scammers use the trusted Tesco name to steal your money and personal information.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.