FeedbackPays.com $500 Dollar Tree Gift Card Scam Exposed

Imagine seeing a bold offer: “Claim your $500 Dollar Tree Gift Card!” You click, excited. After all, who wouldn’t want free money at a popular discount retailer? But what if we told you this promise is a trap? If you’ve come across a site like FeedbackPays.com, it’s critical to proceed with caution. What looks like a generous offer is often a well-disguised scam designed to exploit your data, time, and money.

In this comprehensive investigation, we will expose the shady reality behind FeedbackPays.com and similar fraudulent websites. We’ll walk you through how these scams work, how they ensnare victims, and what you should do if you’ve been caught in their web.

1 37

Scam Overview: What is FeedbackPays.com and Why It’s a Red Flag

FeedbackPays.com is a scam website that masquerades as a promotional platform offering high-value rewards, such as a $500 Dollar Tree gift card, in exchange for completing “simple tasks.” These tasks typically involve surveys, downloads, and trial signups. On the surface, it sounds like an easy way to make money or earn a freebie. But dig deeper, and a web of deception reveals itself.

Suspicious Claims

The website prominently features instructions like:

  • “Click on ‘GET STARTED NOW’ below”
  • “Enter your email and basic information”
  • “Complete 5 recommended deals”
  • “Claim your $500 Dollar Tree Gift Card”

At first glance, this process appears simple. However, the site fails to mention the risks involved, including identity theft, malware installation, unauthorized charges, and personal data abuse.

The Real Motive: Affiliate Commissions

Behind the curtain, FeedbackPays.com is part of a pay-per-action affiliate marketing scam. Each time a user signs up for a “deal” or submits personal data, the scammers earn a commission. They have no intention of ever giving out a $500 gift card. Your interaction is monetized every step of the way.

Clues That It’s a Scam

Here are clear indicators that FeedbackPays.com is not legitimate:

  • No verifiable company information: No address, business registration, or customer service.
  • Fake social proof: Claims like “137 people claimed this offer today” are randomly generated.
  • Redirect loops: Users are sent through numerous shady websites, each one designed to extract more personal data.
  • No actual Dollar Tree endorsement: Dollar Tree has never authorized such giveaways.
  • Too-good-to-be-true offers: Legitimate companies rarely give away $500 for simply clicking and entering an email.

Hidden Costs

What many victims don’t realize is that completing the required deals often involves:

  • Subscribing to services that charge monthly fees
  • Providing credit card details
  • Sharing extensive personal information

Once this information is entered, it can be sold to data brokers or used for further fraud. In worst cases, victims report:

  • Unexpected credit card charges
  • Influx of spam emails and robocalls
  • Compromised accounts and identity theft

FeedbackPays.com is not just a waste of time—it’s a digital predator.

How the Scam Works

Scammers behind FeedbackPays.com follow a highly optimized funnel to draw you in and profit from your actions. Here’s how the typical scam unfolds:

Step 1: The Bait (Fake Gift Card Offer)

You land on a page promising a $500 Dollar Tree gift card. The branding looks convincing. The message is urgent: “Act now! Limited supply!”

Step 2: Get Started Button

You click “GET STARTED NOW,” which initiates a chain of redirects through multiple sketchy affiliate marketing networks. These redirections are monetized, and each click potentially earns the scammers a commission.

Step 3: Form Submission

You’re asked to enter your email, phone number, and sometimes even your full name, address, and date of birth. At this stage, your data is already being harvested.

Step 4: The Deals

To qualify for your reward, you’re told to complete a series of 5 “deals.” These deals include:

  • Signing up for trial subscriptions (e.g., streaming services, diet programs)
  • Downloading mobile apps (some containing malware or trackers)
  • Completing surveys (designed to collect more personal data)
  • Registering for sweepstakes (further data collection or more scam offers)

2 13

Step 5: The Endless Loop

You may never reach a “congratulations” page. If you do, it redirects to even more offers. Many users report never receiving any gift card, even after completing all the deals. Instead, you are bombarded with:

  • Upsell offers
  • Subscription traps
  • More scammy redirects

Step 6: Unwanted Consequences

After completing the process, victims often face:

  • Monthly charges for services they didn’t want
  • Spam calls and emails from third-party marketers
  • Increased risk of identity theft

How to Identify Other Scam Websites Running the Same Scheme

Scammers often use the same tactics across multiple fake websites. They simply swap out logos and brand names — today it’s a “$500 Dollar Tree Gift Card,” tomorrow it might be Target, Walmart, or Amazon. Here are the key warning signs and red flags that indicate a website is part of a fraudulent gift card scam:

1. Promises of High-Value Gift Cards for Minimal Effort

If a website offers something like a $500 gift card just for clicking a link or filling out a form, it’s almost certainly a scam. Real companies rarely give out large-value rewards without proper verification, and never in exchange for just a few “deals” or survey completions.

2. Requires You to Complete “Deals” or “Offers”

These sites typically require users to complete a number of third-party deals, such as downloading apps, signing up for subscriptions, or registering for other promotions. These are designed to generate affiliate income for the scammer — not to reward you.

3. No Clear Contact Information or Company Background

Legitimate promotions are backed by real companies with accessible contact details, physical addresses, and privacy policies. Scam sites usually lack this information or provide fake credentials.

4. Use of Big Brand Logos Without Permission

Scam websites often use logos from Dollar Tree, Walmart, Amazon, or other major retailers to appear trustworthy. Always double-check the offer on the official website of the company to confirm whether it’s real.

5. Numerous Redirects

After clicking “Get Started” or any other call-to-action, you may be taken through a series of unfamiliar, unrelated websites. This is a major red flag — these redirects are used to track your behavior and monetize your clicks.

6. Fake Social Proof and Timers

Look out for:

  • Messages like “237 people claimed this today”
  • Countdown timers to create urgency
  • Stock photos of “recent winners”

These are fake elements meant to pressure you into acting quickly without thinking.

7. Requests for Sensitive Information Early On

Be very cautious of sites that ask for your full name, email, phone number, address, or — especially — credit card details, before you’ve even confirmed what you’re getting.

8. Poor Grammar or Generic Design

Scam websites often use generic templates and may contain grammatical errors, awkward phrasing, or low-quality visuals. While this isn’t always the case, it can be a strong indicator of a fake site.

9. URLs That Don’t Match the Brand

Always check the domain name. If the website claims to represent Dollar Tree but the URL is something like freestuff-deals-now.xyz, it’s not legitimate. Real promotions are hosted on the official brand’s domain.

10. No Mention on Official Company Channels

Check the official website and social media of the company offering the gift card. If there’s no mention of the promotion there, it’s almost certainly a scam.

Bonus Tip: Use Scam Alert Tools

You can use websites like AdGuard to check if a site has been flagged as unsafe. Browser extensions like Web of Trust (WOT) can also help detect scams in real-time.

By learning to spot these warning signs, you can protect yourself and others from falling into these digital traps. Always take a moment to investigate before clicking or signing up for any “too good to be true” offers.

What to Do If You Have Fallen Victim to the Scam

If you’ve interacted with FeedbackPays.com and shared personal or financial data, act quickly to minimize damage:

1. Cancel Unwanted Subscriptions

Go through your email and bank records to find any services you signed up for and cancel them.

2. Monitor Your Bank Accounts

Check for unauthorized transactions. Contact your bank or card issuer to dispute charges and possibly block your card.

3. Change Passwords

If you reused any passwords, change them immediately, especially for accounts linked to your email.

4. Scan for Malware

If you downloaded anything from their links, run a full antivirus scan on your device.

5. Report the Scam

6. Freeze Your Credit

Consider freezing your credit with all three major bureaus (Experian, TransUnion, Equifax) to prevent identity theft.

7. Use Identity Monitoring Services

Services like LifeLock, IdentityGuard, or Aura can help track and protect your identity from further misuse.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions (FAQ)

Is FeedbackPays.com a legitimate website?

No, FeedbackPays.com is not a legitimate website. It is a scam site that uses deceptive marketing tactics to lure users into sharing personal information, signing up for subscriptions, and downloading potentially harmful apps under the false promise of a $500 Dollar Tree gift card.

Will I actually receive a $500 Dollar Tree gift card?

No, there is no verified evidence that anyone has received a legitimate gift card from this promotion. The promised reward is used purely as bait to get users to complete tasks that generate affiliate revenue for the scammers.

What are the risks of completing the “deals”?

The deals often require users to:

  • Enter personal and financial information
  • Sign up for trial subscriptions that lead to recurring charges
  • Download apps that may contain malware or spyware
  • Receive excessive spam or robocalls

These actions can result in identity theft, financial loss, and long-term privacy issues.

Why do they ask for my personal information?

Your personal data is extremely valuable to scammers. It can be sold to third-party marketers or used to open fraudulent accounts, commit identity theft, or bombard you with spam.

How do these scams make money?

Scammers earn affiliate commissions every time you:

  • Click on a redirect link
  • Complete a survey or download an app
  • Sign up for a subscription or trial service

They profit without ever having to send you a gift card.

What should I do if I already completed the steps?

If you have already entered personal or financial details, take immediate action:

  • Cancel any services or subscriptions you signed up for
  • Contact your bank or credit card provider to report and dispute unauthorized charges
  • Run a full antivirus scan on your device
  • Change any reused passwords
  • Report the scam to authorities like the FTC or IC3

How can I avoid falling for similar scams in the future?

  • Always verify the legitimacy of online offers by checking with the official brand or company
  • Look for contact information and customer reviews
  • Be skeptical of high-value rewards that require sensitive information
  • Avoid clicking on unsolicited links or ads that seem too good to be true

Is Dollar Tree involved with this offer?

No, Dollar Tree has not endorsed or authorized any $500 gift card giveaway associated with FeedbackPays.com. Their brand name and logo are being used without permission.

Can I report this scam?

Yes, and you should. You can report the scam to:

  • The Federal Trade Commission (FTC)
  • The Internet Crime Complaint Center (IC3)
  • The Better Business Bureau (BBB)
  • Dollar Tree’s customer service to notify them about the misuse of their brand

The Bottom Line

The FeedbackPays.com “$500 Dollar Tree Gift Card” offer is a classic scam wrapped in shiny packaging. It preys on curiosity and financial hope, offering nothing in return but financial loss and data theft. If an offer sounds too good to be true—it almost certainly is.

Stay vigilant, verify before you trust, and always do your research. Your data is valuable—don’t hand it over to fraudsters.


Want to help others? Share this article to warn your friends and family about the dangers of online gift card scams. Together, we can make the internet a safer place.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment