Elon Musk Mega Millions Email Scam: Do Not Reply to This Fake Winner Message

A new email scam is using Elon Musk’s name, Tesla, and Mega Millions to trick people into believing they were randomly selected to receive $2 million and a Tesla Model X.

The message is fake. Elon Musk is not emailing random people with lottery winnings, Tesla is not involved, and Mega Millions does not notify winners by random email. Mega Millions states that its representatives do not call, text, or email people to tell them they won a prize.

This scam is designed to make victims reply first. Once they respond, scammers begin asking for personal information, banking details, fake “processing” fees, gift cards, cryptocurrency payments, or copies of identity documents.

scam 1 2

What Is the Elon Musk Mega Millions Jackpot Email Scam?

The Elon Musk Mega Millions Jackpot Email Scam is a fake lottery and celebrity impersonation scam. The email pretends to come from Elon Musk and claims that the recipient has been selected to receive a large donation after a random “spin ball” selection.

One version says:

“I am Elon Musk the CEO of Tesla, the owner of Tesla $533 Million USD Mega Millions Jackpot… I have voluntarily decided to donate sum of $2 Million USD to you as one of the selected winner and a Tesla Model X.”

The email then gives a “winning code” and tells the recipient to reply to suspicious addresses such as a random Gmail account or an unrelated domain.

The purpose is not to give away money. The purpose is to make the victim believe they are already a winner, then slowly pull them into a scam conversation.

This type of fraud combines three familiar tricks:

1. Celebrity impersonation

The scammer uses Elon Musk’s name because he is widely associated with Tesla, wealth, technology, and large public giveaways. Similar fake Elon Musk donation and giveaway emails have circulated before, including campaigns promising large cash gifts to random recipients

2. Fake lottery winnings

The email claims the money comes from a Mega Millions jackpot. This is a major red flag. You cannot win a lottery you did not enter, and legitimate lottery organizations do not randomly select email addresses and send secret winning codes.

3. Advance-fee fraud

Once the victim replies, the scammer usually claims that a small payment is required before the prize can be released. The fee may be described as tax, insurance, shipping, ATM card activation, courier delivery, legal clearance, anti-terrorism certificate, or bank transfer processing.

How the Scam Email Looks

These emails are usually poorly written but still effective because the promised reward is enormous. The scammer wants the victim to focus on the $2 million prize and Tesla car rather than the obvious warning signs.

Common wording includes:

  • “Attention: Lucky winner”
  • “I am Elon Musk the CEO of Tesla”
  • “You were selected after a spin ball”
  • “I am donating to 5 random persons”
  • “You have won $2 Million USD”
  • “You also won a Tesla Model X”
  • “This is your winning code”
  • “Reply with the winner code”
  • “I will send it by Cashier’s check or ATM Card”
  • “God bless you”

The email may include multiple reply addresses, often from Gmail, Outlook, Yahoo, or strange domains that have nothing to do with Tesla, Mega Millions, or Elon Musk.

That alone is enough to treat the message as fraudulent.

How the Elon Musk Mega Millions Scam Works

Step 1: The victim receives a fake “winner” email

The scam starts with an unexpected email claiming the recipient has been selected for a major donation or jackpot prize.

The email often uses emotional language such as “lucky winner,” “selected winner,” “God bless you,” or “charity donation.” This is meant to make the message feel personal, generous, and urgent.

The scammer also includes a fake winner code to make the message look official.

Step 2: The victim replies with the code

The victim is told to reply with the “winner code.” This step is important for the scammer because it confirms the email address is active and that the person may be interested.

Once the victim replies, the scammer can begin a longer conversation.

Step 3: The scammer asks for personal information

The scammer may ask for:

  • Full name
  • Home address
  • Phone number
  • Date of birth
  • Occupation
  • Bank name
  • Copy of passport, driver’s license, or ID card
  • Selfie or proof of identity
  • Preferred payment method

They may claim this information is needed for verification, delivery, tax clearance, or transfer approval.

This is dangerous. The information can be used for identity theft, account fraud, SIM-swapping attempts, or future scams.

Step 4: The victim is asked to pay a fee

After the victim provides information, the scam usually moves to the payment stage.

The scammer may claim the $2 million is ready but cannot be released until the victim pays:

  • Processing fees
  • Delivery charges
  • Tax clearance fees
  • Insurance fees
  • ATM card activation fees
  • Bank transfer fees
  • Customs charges
  • Legal documentation fees

They may request payment through gift cards, cryptocurrency, wire transfer, Zelle, Cash App, bank deposit, or money transfer services.

This is the core of the scam. The victim pays a smaller amount hoping to unlock a much larger prize, but the prize does not exist.

Step 5: The scammer keeps inventing new fees

If the victim pays once, the scammer usually asks for more.

They may say there was a problem with the bank, the courier needs another payment, the government requires a certificate, or the transfer was blocked due to international regulations.

Each payment creates a new excuse for another payment.

Step 6: The scammer may send fake documents

To look legitimate, scammers may send fake certificates, fake Tesla letters, fake Mega Millions forms, fake bank transfer screenshots, fake courier receipts, or fake ID cards.

These documents are not proof of anything. They are created to pressure the victim into continuing.

Step 7: The scammer disappears or sells the victim’s information

Eventually, the scammer stops responding, demands increasingly larger payments, or passes the victim’s information to other criminals.

Victims may then receive more scam emails, phone calls, fake recovery offers, or impersonation attempts.

Red Flags in This Scam Email

This email contains many clear warning signs.

You did not enter a lottery

You cannot win Mega Millions by being randomly selected through email. A legitimate lottery prize requires a real ticket or official entry.

Mega Millions does not notify random winners by email

Mega Millions warns that no representative would call, text, or email someone to announce a prize.

The message impersonates Elon Musk

Scammers often use famous names to make fake offers look believable. Elon Musk’s name is frequently abused in fake giveaways, crypto scams, donation scams, and fake Tesla promotions.

The email uses suspicious addresses

The sample tells recipients to reply to addresses such as elon-musk@model-v.online and elon09471@gmail.com. A random Gmail account is not an official Tesla, Mega Millions, or Elon Musk communication channel.

The grammar is poor

Phrases like “selected after a spin ball,” “donate sum of $2 Million USD,” and “owner of Tesla $533 Million USD Mega Millions Jackpot” are obvious signs of a scam message.

It offers both cash and a luxury car

Scammers often combine huge cash prizes with cars, electronics, or luxury items to make the offer feel more exciting.

It mentions cashier’s check or ATM card

Fake cashier’s checks and fake ATM cards are common in advance-fee scams. The scammer may claim a card is loaded with money but needs an activation or delivery fee.

It asks you to reply first

The scam does not include a legitimate claim process. It simply asks the recipient to respond, which gives the scammer a chance to manipulate them directly.

What Happens If You Reply?

Replying does not automatically steal your money, but it does confirm that your email address is active.

After replying, you may receive:

  • More scam emails
  • Requests for personal documents
  • Requests for fees
  • Fake prize forms
  • Fake legal documents
  • Phone calls from fake agents
  • Threats that the prize will be canceled
  • Pressure to act quickly

Do not continue the conversation. Block the sender and report the email.

What To Do If You Received This Email

If you received the Elon Musk Mega Millions Jackpot email but did not reply:

  1. Do not respond.
  2. Do not click links or open attachments.
  3. Mark the email as spam or phishing.
  4. Delete it.
  5. Report it to your email provider.

The FTC recommends reporting phishing attempts and then deleting the message once reported.

What To Do If You Replied

If you replied but did not send money or personal information:

  1. Stop communicating immediately.
  2. Do not explain yourself to the scammer.
  3. Block the sender.
  4. Mark the message as phishing.
  5. Watch for follow-up scams from similar addresses.

Scammers may contact you again using different names, claiming they can still release the money.

What To Do If You Sent Personal Information

If you sent your name, address, phone number, ID, banking information, or other sensitive details:

  1. Contact your bank if financial information was shared.
  2. Change passwords for important accounts.
  3. Enable two-factor authentication.
  4. Watch for suspicious login alerts.
  5. Monitor bank accounts and credit cards.
  6. Consider placing a fraud alert or credit freeze if you are in the U.S.
  7. Report the scam to the FTC.

The FTC accepts fraud reports through ReportFraud.ftc.gov.

What To Do If You Sent Money

If you paid the scammer:

  1. Contact your bank, card issuer, payment app, or crypto exchange immediately.
  2. Ask whether the transaction can be reversed or blocked.
  3. Save all emails, payment receipts, wallet addresses, phone numbers, and screenshots.
  4. Report the scam to the FTC.
  5. Report online fraud to the FBI’s Internet Crime Complaint Center if you are in the U.S. The FBI directs victims of online scams and internet-enabled crimes to IC3.gov.
  6. Do not trust anyone who contacts you claiming they can recover the money for a fee.

Recovery scams are common after lottery and prize scams. A second scammer may claim to be a lawyer, investigator, bank officer, or government agent who can recover your lost funds. That is usually another scam.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

The Bottom Line

The Elon Musk Mega Millions Jackpot email is a scam.

You were not randomly selected for $2 million. Elon Musk did not send the message. Tesla is not giving away a Model X through random email addresses. Mega Millions does not notify winners this way.

The goal is to make you reply, collect your personal information, and eventually convince you to pay fake fees for a prize that does not exist.

Do not respond, do not send documents, and do not pay anything. Mark the message as phishing, block the sender, and report it.

FAQ

Is the Elon Musk Mega Millions Jackpot email real?

No. The email is fake. Elon Musk is not randomly emailing people to give away $2 million, a Tesla Model X, cashier’s checks, or ATM cards. This is a lottery and celebrity impersonation scam.

Did Elon Musk really win a $533 million Mega Millions jackpot?

No credible evidence supports that claim. Scammers often invent jackpot amounts and connect them to famous people to make the message sound more believable.

Why does the email mention Tesla and a Model X?

The scammers use Tesla because Elon Musk is strongly associated with the company. Mentioning a Tesla Model X makes the fake prize feel more exciting and valuable.

Can I win Mega Millions through a random email?

No. You cannot win Mega Millions if you did not buy a valid ticket or enter through an official channel. Mega Millions does not randomly select email addresses and send secret winner codes.

What happens if I reply to the scam email?

Replying tells the scammer your email address is active. They may then ask for personal information, banking details, ID documents, or fake fees before they “release” the prize.

Why do scammers ask for a winner code?

The winner code is fake. It is used to make the email look official and to start a conversation with the victim.

What information will the scammers ask for?

They may ask for your full name, address, phone number, date of birth, bank details, ID documents, or payment information. Do not provide any of it.

Will they ask for money?

Usually, yes. They may claim you need to pay processing fees, taxes, delivery costs, insurance, ATM card activation fees, or legal clearance fees. Any request to pay before receiving a prize is a major scam warning sign.

What should I do if I received the email?

Do not reply. Do not click links. Do not open attachments. Mark the email as spam or phishing, block the sender, and delete it.

What should I do if I already sent money?

Contact your bank, card issuer, payment app, or crypto exchange immediately. Save screenshots and emails as evidence, then report the scam to the proper fraud reporting agency in your country. Do not trust anyone who says they can recover the money for an upfront fee.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Comment on this post

Previous

Apple Support Text Scam: Fake Apple Security Alerts Explained