Beware of the Viral Zara Reviewer Scam Offering Fake Rewards

A new phishing scam offering big payouts to review Zara clothing has emerged on social media. Scammers are impersonating the popular fashion retailer with fake ads, websites, and social channels to ensnare victims. But does this scheme promising free Zara vouchers for your feedback hold up? Or is it an elaborate hoax aimed at stealing personal information and money? Keep reading to uncover the truth.

Dashingreviews.com scam

An Overview of the Zara Reviewer Scam

A new scam promising rewards like gift cards for reviewing Zara products has proliferated across social media and messaging platforms. Fraudsters are infiltrating platforms to spread bogus offers impersonating the popular fashion brand. But their aim is harvesting data, not providing shoppers an opportunity to earn free vouchers.

The offers typically promote a chance for regular people to become Zara “Product Testers.” In exchange for reviewing and providing feedback on their latest clothing collections, Zara claims they will send Product Testers gift cards worth $700 or more.

The social media ads are made to look official using Zara’s logo, fonts, and product imagery. Employing the familiar branding tricks users into believing the ads come directly from Zara.

Attention-grabbing headlines invite people to click on links leading to fake Zara websites controlled by scammers. Some examples include “Earn $700 Gift Cards Just for Testing Zara’s Latest Styles!” or “Zara Wants YOU to Review Our New Fall Line!”

To create urgency, some versions emphasize limited availability, claiming only a certain number of Product Tester spots are open. Others pretend the opportunity is only available to residents of specific countries like the USA, Canada, UK, or Australia.

In reality, the scam simply utilizes Zara’s brand recognition to deceive people into providing their personal information under the guise of accessing an exclusive opportunity.

Once users click on the links in the ads, they are directed to sophisticated fake websites dressed up to look exactly like the real Zara.com site. Everything from the logo to the fonts, colors, navigation menus, and product photos are precisely replicated to dupe visitors.

But while extremely convincing at first glance, the fraudulent sites have slight variations to the URL, often including the words “review”, “rewards”, or “producttest.”

Examples of specific sham websites reported include:

  • zarareviews.top – Mirrors Zara.com and offers $700 gift cards for testing 2-3 products.
  • zaraclothingchecker.xyz – Claims limited reviewer spots available in the USA, Canada, UK and Australia only.
  • products-reviewnowz.shop/zara-tester – Ad promises extra bonus rewards for referring friends to the program.

On these bogus sites, users are prompted to enter their name, email address, and contact information under the false pretense it will start the process for Zara to ship free clothing items to review. In reality, it only gives scammers personally identifiable data to target victims.

Right after individuals submit their information, they receive crafted emails pretending to be from Zara. These messages provide further instructions to complete additional steps before rewards can be claimed.

The emails direct recipients to outside websites and offers deceptively dressed up as “deal portals”, downloads, surveys, or other activities. Users must complete 2-3 of these offers before their $700 Zara gift card can supposedly be unlocked.

In truth, these outside sites have nothing to do with Zara. They aim to phish even more sensitive user information, get users to download malware, or sign up for subscriptions and services benefiting the scammers through commissions and fees.

Despite social proof and personalization in the fake Zara emails, the advertised rewards never materialize for those who comply with all steps of the scam. Zara has confirmed they are not currently operating any Product Tester programs, nor would they authorize any third parties to hand out such rewards.

The company is actively working to detect and pursue legal action against scammers misappropriating their brand name and duping their customers. But consumers must also be vigilant against falling for the fake reward promises and persuasion tactics.

How the Zara Reviewer Scam Fools Users Step-by-Step

To help you recognize and avoid this viral con, let’s break down the sneaky tactics used at each step:

Step 1: Deceptive Social Media Ads

The scam starts with ads on platforms like Facebook, Instagram, WhatsApp, and Telegram. Using Zara’s logo and photos, they tout a special opportunity to earn gift cards worth $700 or more by reviewing products as a Zara “Product Tester”.

Some versions pretend satisfied reviewers are sharing the secret opportunity. Others emphasize LIMITED SPOTS! or SPECIAL PROMOTION to create false urgency. The real goal is tricking users to click through to the scam site.

Step 2: Fake Zara Review Website

Clicking the link in the ads takes users to sham Zara domains made to look like the real ecommerce site. The URL may be slightly altered, often including words like “review”, “rewards”, or “producttest”. But the site perfectly copies Zara’s design, images, and text.

This tricks users into believing they are in the official Zara product tester portal. In reality, it’s just an elaborate fake created by scammers to harvest info.

Zareviewer.com scam

Step 3: Submit Email to Register

The fraudulent site prompts visitors to enter their email address and name to sign up as a product tester. Users think this will start the process of Zara shipping free clothes to try and review.

But in reality, giving up an email simply passes personally identifiable data to scammers. Almost instantly, “Zara” sends instructions to continue completing steps before rewards can be claimed.

Step 4: Bogus Deals, Downloads, and Surveys

The email directs recipients to outside websites disguised as deals, downloads, or surveys. Users must complete 2-3 offers as a “Reviewer Verification” step before gift cards can be redeemed.

Examples of activities users get tricked into:

  • Paid survey offers
  • Free trial subscriptions
  • Enter credit card or financial info
  • Download and install unknown apps
  • Subscribe to text messaging services

None of this actually helps verify users for a real Zara program. They are just affiliate offers that earn scammers money through commissions, stolen financial data, or loaded with malware.

Step 5: No Rewards Ever Given

Despite jumping through all the scam hoops, no Zara gift cards ever materialize. The brand confirms they are not running any reviewer programs, nor would they authorize outside parties to hand out $700 rewards without oversight.

The phishers bank on only a small percentage following through to expose what they’re really after: your data, downloads, referrals, and sales commissions. Don’t get played by their social engineering.

Is This a Real Zara Opportunity? Recognizing Red Flags

Despite the convincing presentation, certain red flags reveal this Zara deal is 100% fake:

  • Bogus domains – Real Zara sites use zara.com addresses. Any variation should raise alarms.
  • Poor grammar/typos – Zara is a global brand that would not have glaring language errors.
  • Requesting personal info upfront – Zara would vet reviewers before requesting sensitive data.
  • Affiliate offers – No legitimate rewards program funnels users to outside subscription services.
  • High value with no oversight – No retailer freely gives $700 without strict identity verification.
  • Limited time pressure – Fake urgency is meant to short-circuit critical thinking.

When scrutinized, it becomes clear the scam aims to exploit excitement over gift cards and harvest data, not provide legitimate rewards. If an offer seems rife with red flags, trust your instincts.

Steps to Take if You Fell for the Scam

If you already supplied information or completed sketchy offers related to the fake Zara reviewer program, immediately take these steps:

  1. Contact Zara to report the scam and misuse of their brand. Provide details that could help them pursue legal action.
  2. Mark any emails as phishing/spam to train your email provider. This prevents future scam messages from coming through.
  3. Run anti-virus and malware scans on all devices used to visit scam sites or download files. Delete anything suspicious.
  4. Place fraud alerts with credit bureaus and closely monitor your statements for any unauthorized charges.
  5. Change passwords on any sites you accessed through the scam offers. Opt for strong, unique passwords for all important accounts.
  6. Act swiftly to cancel recurring fees or charges from any “free trial” subscriptions signed up for. Alert your payment provider of potential fraud.
  7. Never share additional personal information if scammers attempt to contact you again.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Avoiding Future Scams

Here are some tips to avoid getting hooked by copycat phishing scams:

  • Verify directly with brands before engaging – Don’t rely on third-party ads or messages.
  • Search online for scam reports about any offer that seems suspicious.
  • Check site URLs carefully to detect imitation domains.
  • Read all disclaimers/terms in full before providing info or clicking links.
  • Avoid downloading software or files from unknown third-party sites.
  • Monitor accounts after data breaches related to any scam.
  • If the offer seems too good to be true, it always is. Full stop.

Staying vigilant against increasingly sophisticated social engineering ploys takes concerted effort. But a dose of skepticism and common sense goes a long way in recognizing and avoiding online scams.

Frequently Asked Questions About the Fake Zara Reviewer Scam

1. How does the fake Zara reviewer scam work?

The scammers post social media ads promoting a fake chance to review Zara products for rewards. The ads link to convincing counterfeit sites impersonating Zara. On these fake sites, users submit an email address expecting to register as a product tester. Soon after, they receive phishing messages guiding them through bogus offers under the guise of “verifying” their reviewer status. Zara confirms these websites and offers are completely unauthorized and fake.

2. What tricks do the scammers use?

The ads copy Zara’s branding and imagery to appear real. The scam sites closely replicate the visual design of Zara.com. Enticing messages promise easy gift cards for giving product feedback. False claims about limited spots or one-time offers create urgency to act quickly. This gets users to lower their guard and click through.

3. What happens after you submit your email?

Soon after registering at the sham site, users get emails claiming more steps are required before Zara rewards can be unlocked. These subsequent pages aim to expose visitors to paid surveys, suspicious downloads, free trials of scammer products, and other risks designed to generate illicit profits.

4. Do you actually get a Zara gift card?

No, those who comply with the scam never receive any Zara gift cards or products to review. The advertised rewards are bogus – Zara does not have any associated program sending free vouchers for customer feedback.

5. How can you recognize the fake Zara reviewer ads and sites?

Warning signs include unbelievable offers, grammar/spelling errors, incorrect URLs, requests for personal info upfront, paid third-party offers, and artificial scarcity claims. Verify directly with Zara Customer Service if an ad seems fishy.

6. What should you do if already victimized by this scam?

If you supplied any personal information, place fraud alerts, scan devices for malware, monitor financial accounts, change passwords, and contact Zara to report the scam. Remain vigilant against sharing additional data now that scammers have your email address.

7. How can you avoid Zara reviewer scams?

Avoid clicking direct links in unsolicited messages. Verify URLs match official brand sites exactly. Search for scam reports about offers online. Read all terms and disclaimers before providing info. Report suspicious ads/offers instead of engaging.

8. Who is responsible for the fake Zara ads and websites?

Unknown scammers are behind the fake ads and websites misusing Zara’s brand. They have no actual relationship with Zara. The company is actively working to detect and pursue legal action against impersonators.

9. Does Zara really offer chances to review products for rewards?

Zara has stated they currently do not offer any official paid product tester opportunities or gift card incentives. Any ads along these lines are fraudulent. Zara is not authorizing real rewards through any third parties.

10. What is Zara’s advice about the scam?

Zara recommends immediately reporting any suspicious ads, websites, or offers to their customer service team to aid their efforts combating the scam and pursuing its creators. Avoid engaging with the false offers in any way.

The Bottom Line

The promise of easy money and Zara gift cards for reviewing clothes may sound enticing. But engaging with fake ads or offers only leads to wasted time at best, and potential identity theft at worst.

Scammers will continue dreaming up new ways to profit from impersonation and deception. But educating yourself on their tactics keeps you two steps ahead.

When an unbelievable social media deal lands in your feed, resist the knee-jerk urge to click. Instead, scrutinize the opportunity objectively. Verify directly with brands before providing data. If your gut says something is amiss, close the tab and warn others.

A scam revealed is no longer a threat. By exposing these schemes for what they are, we can create an online world rooted in transparency rather than trickery. Stay smart and stay safe.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment