Skip to main content

A new WhatsApp Scam : Amazon's 30th anniversary celebration free gifts!

Awareness is necessity

One of my friend sent a message yesterday asking me to take a survey to claim free gifts as part of Amazon’s 30th Anniversary celebration.

Did you receive this kind of message ?

If yes then beware !!!
It’s a new whatsapp scam. "


Letme inform you first that according to WIKIPEDIA Jeff Bezos founded Amazon in July 1994. Now count the years . It's only 26 years. And here in the title they mentioned a 30th anniversary celebration.

There are several ways to identify the link whether it is original or fake.

When users click on the message, a new window opens saying “Congratulations, you have been chosen to participate in our survey”. Users are asked to answer four questions. After the user submits the answers , Bunch of gift boxes appears on the screen asking user to make a selection. In most cases it is the Huawei Mate 40 pro .

I marked red squares on screenshots , when you try to click on that button or sign-in label , they are unclickable. This is a sign of a phishing/fake page. Then this website asks users to share the quiz with “5 whatsapp groups” and “20 friends”.

Never Do this

You are becoming a part of such a scam unintentionally and spreading it to more people. Providing some personal information on such websites can be dangerous .

When you click on complete registration button, it will redirect you to fake links. Keep in mind while visiting such fake websites that it will redirect you on malicious links and pop-ups and then when we download, its something else. It maybe any worm or any encrypted malware. Some bad people can use such links to spread/install malware in your device.

You can see page redirection fake links in below images.


So the motive behind this article is to spread awareness about this kind of WhatsApp scam. As cybercriminals are becoming very smart day by day, they are using new ideas to make people fool and gather informations.

Comments

Popular posts from this blog

How to Pass CompTIA Security+ SY0-701 in 2 Months (839 Score Breakdown + Resources)

How I Scored 839/900 on CompTIA Security+ SY0-701 — 2-Month Prep Strategy That Actually Worked Score: 839/900  |  Exam: CompTIA Security+ SY0-701  |  Prep Time: 2 Months  |  Total Questions: 76 (including 3 PBQs) I'm not going to sugarcoat it — CompTIA Security+ is not easy, but it is very passable with the right strategy. I cleared it with an 839 out of 900, and in this post I'll share exactly how I did it, domain by domain, so you can replicate the approach without wasting time. My 2-Month Study Plan Month 1 — Domain-by-domain study: Read, take notes, and build comparison tables and mnemonics for tricky concepts. Month 2 — Heavy practice testing: Full focus on practice tests and PBQ simulations. Time management drills every session. The biggest mistake people make is spending 90% of their time reading and only 10% practicing. I flipped that in month 2 — and it made all the difference. Domain 1 — General Security Concepts What to focu...

Email Security Deep Dive: 13 Steps to Keep Your Emails Safe

Email Security Checklist The Email Security Checklist 1. Enable SPF (Sender Policy Framework) What it is: SPF is like a guest list for your email domain. It tells the world that only specific servers are allowed to send email for your domain. How it works: Publish an SPF record in DNS. When someone receives an email claiming to be from your domain, their mail server checks if the sending IP is listed in the SPF record. If the IP is not listed, the email is rejected or marked as spam. Example SPF record: v=spf1 ip4:203.0.113.0/24 include:_spf.google.com -all Only servers in the specified IP range and Google’s mail servers can send emails for this domain. Others are rejected. Points to Note: Prevents attackers from spoofing your domain and sending phishing or spam emails. 2. Enable DKIM (DomainKeys Identified Mail) What it is: DKIM is a digital signature for each email, ensuring that the message hasn’t been tampered with. Ho...

Deep Dive into Cybersecurity: Security+ Level Knowledge Without the Certificate

📚 My Cybersecurity Learning Journey Key Topics from a 17-Hour Security+ Course ðŸ”đ CIA Triad Explained Confidentiality: Ensuring that sensitive data is only accessed by authorized users. This is often achieved using encryption and access controls. Integrity: Ensuring data is accurate and untampered. Techniques like hashing, checksums, and digital signatures help validate that data hasn't been altered. Availability: Making sure systems and data are accessible when needed. Achieved through backups, redundancy, load balancing, and fault-tolerant design. ðŸ”đ Types of Threats Malware: Includes viruses, ransomware, worms, and trojans that compromise devices or networks. Social Engineering: Manipulating users into giving up confidential info. Example: Phishing emails. Insider Threats: Employees or contractors misusing access, accidentally or intentionally. Advanced Persistent Threats (APTs): Long-term targeted attacks, often by well-funded threat actors. Zero...

Do you know, by blindly following trends and using hashtags you can be the victim of cyber crime? : #couplechallenge

Awareness is necessity "Nohashtag challenges" Nowadays, #couplechallenge, #smilechallenge, #chirichchallenge trending on social media platforms. But do you know the history of hashtags? Lets see, how hashtag was invented. Chris Messina a product designer who has been working in Silicon Valley created the idea of hashtag. He and his small group of colleagues were thinking that twitter needs some kind of frame work. He got the idea of hashtag from internet chat room that had pound symbol in front of them. His main idea to create hashtag was for the internet and wanted that anybody writing text on internet be able to participate in global conversation. In 2007, he asked one of his friends to use #sandiego for his tweets and this way the use of hashtag started. In 2009, Twitter added the option of hashtag to its search bar. And this way hashtag became a trend. This trend then being followed by other apps like tumbler, Facebook, instag...

āŠŠ્āŠ°ાāŠ‡āŠ āŠļ્āŠ•ેāŠŪ: āŠœો āŠĪāŠŪાāŠ°ે āŠ‡āŠĻાāŠŪ āŠŪેāŠģāŠĩāŠĩા āŠŪાāŠŸે āŠšૂāŠ•āŠĩāŠĢી āŠ•āŠ°āŠĩી āŠŠāŠĄāŠĪી āŠđોāŠŊ āŠĪો āŠĪે āŠ‡āŠĻાāŠŪ āŠĻāŠĨી

Awareness is necessity āŠķું āŠĪāŠŪāŠĻે āŠ•્āŠŊાāŠ°ેāŠŊ āŠ•ોāŠˆ āŠ•ોāŠē્āŠļ āŠ†āŠĩ્āŠŊા āŠ›ે āŠ•ે āŠœેāŠŪાં āŠĪāŠŪે āŠ•ોāŠˆ āŠŠāŠĢ āŠ“āŠĻāŠēાāŠ‡āŠĻ āŠķોāŠŠિંāŠ— āŠĩેāŠŽāŠļાāŠ‡āŠŸāŠŪાંāŠĨી āŠ‡āŠĻાāŠŪ āŠ…āŠĨāŠĩા āŠēોāŠŸāŠ°ી āŠœીāŠĪી āŠēીāŠ§ી āŠđોāŠŊ āŠĪેāŠĩું āŠ•āŠđે āŠ›ે? āŠķāŠ•્āŠŊāŠĪા āŠ›ે āŠ•ે āŠ† āŠ•ોāŠē્āŠļ āŠŦ્āŠ°ોāŠĄ āŠ›ે. āŠļાāŠŊāŠŽāŠ° āŠļ્āŠĩāŠŊંāŠļેāŠĩāŠ• āŠĪāŠ°ીāŠ•ે, āŠŪેં āŠ† āŠŠ્āŠ°āŠ•ાāŠ°āŠĻી āŠ›ેāŠĪāŠ°āŠŠિંāŠĄીāŠ“āŠĻા āŠ•ેāŠŸāŠēાāŠ• āŠ•ેāŠļ āŠĻું āŠ…āŠ§્āŠŊāŠŊāŠĻ āŠ•āŠ°્āŠŊું āŠ›ે. āŠšાāŠēો āŠļāŠŪāŠœીāŠ āŠ•ે āŠ† āŠŠ્āŠ°āŠ•ાāŠ°āŠĻી āŠ›ેāŠĪāŠ°āŠŠિંāŠĄી āŠ•ેāŠĩી āŠ°ીāŠĪે āŠĨાāŠŊ āŠ›ે? !! āŠ›ેāŠĪāŠ°āŠŠિંāŠĄી āŠ•āŠ°āŠĻાāŠ° āŠĪāŠŪāŠĻે āŠ•ોāŠˆāŠŠāŠĢ āŠĩિāŠķ્āŠĩāŠļāŠĻીāŠŊ āŠ“āŠĻāŠēાāŠ‡āŠĻ āŠķોāŠŠિંāŠ— āŠļાāŠ‡āŠŸāŠŪાંāŠĨી āŠ•āŠ°્āŠŪāŠšાāŠ°ી āŠđોāŠĩાāŠĻુ āŠ•āŠđે āŠ›ે.āŠĪેāŠ“ āŠĪāŠŪāŠĻે āŠļાāŠ‡āŠŸ āŠŠāŠ°āŠĨી āŠĪāŠŪાāŠ°ી āŠ›ેāŠē્āŠēી āŠ–āŠ°ીāŠĶી āŠĩિāŠķેāŠĻી āŠĩિāŠ—āŠĪો, āŠ‰āŠĪ્āŠŠાāŠĶāŠĻ āŠ…āŠĻે āŠ“āŠ°્āŠĄāŠ° āŠĻી āŠĩિāŠ—āŠĪો āŠļાāŠĨે āŠĪāŠŪāŠĻે āŠŪāŠĻાāŠĩāŠĩાāŠĻો āŠŠ્āŠ°āŠŊાāŠļ āŠ•āŠ°ે āŠ›ે. āŠœ્āŠŊાāŠ°ે āŠ•ોāŠˆ āŠĩ્āŠŊāŠ•્āŠĪિ āŠŪાāŠĻે āŠ›ે āŠ•ે āŠ›ેāŠĪāŠ°āŠŠિંāŠĄી āŠ•āŠ°āŠĻાāŠ° āŠ“āŠĻāŠēાāŠ‡āŠĻ āŠļાāŠ‡āŠŸāŠĻો āŠ•āŠ°્āŠŪāŠšાāŠ°ી āŠ›ે, āŠĪ્āŠŊાāŠ°ે āŠĪેāŠ“ āŠĪāŠŪāŠĻે āŠĩિāŠĩિāŠ§ āŠ‡āŠĻાāŠŪો āŠœેāŠĩા āŠ•ે āŠēેāŠŠāŠŸોāŠŠ, āŠŸીāŠĩી, āŠŪોāŠŽાāŠ‡āŠē āŠŦોāŠĻ āŠĩિāŠķે āŠ†āŠ•āŠ°્āŠ·āŠ• āŠŊોāŠœāŠĻાāŠ“ āŠ†āŠŠે āŠ›ે āŠ…āŠĻે āŠĪāŠŪાāŠ°ી āŠŠાāŠļેāŠĨી āŠāŠ• āŠ‡āŠĻાāŠŪ āŠŠāŠļંāŠĶ āŠ•āŠ°āŠĩાāŠĻો āŠĩિāŠ•āŠē્āŠŠ āŠ†āŠŠે āŠ›ે.āŠœ્āŠŊાāŠ°ે āŠĪāŠŪે āŠĨોāŠĄી āŠ°ુāŠšિ āŠŽāŠĪાāŠĩો āŠ…āŠĻે āŠ‡āŠĻાāŠŪ āŠŠāŠļંāŠĶ āŠ•āŠ°ો āŠĪ્āŠŊાāŠ°ે āŠ‰āŠē્āŠēેāŠ–િāŠĪ āŠ‡āŠĻાāŠŪāŠŪાંāŠĨી, āŠĪેāŠ“ āŠĪāŠŪāŠĻે SMS āŠĪāŠ°ીāŠ•ે āŠāŠ• āŠēિંāŠ• āŠŪોāŠ•āŠēે āŠ›ે.āŠŪોāŠ•āŠēેāŠēી āŠēિંāŠ• āŠ āŠ›ેāŠĪāŠ°āŠŠિંāŠĄીāŠĻી āŠēિંāŠ• āŠ›ે āŠœે āŠĪāŠŪાāŠ°ી āŠĩિāŠ—āŠĪો āŠœેāŠĩી āŠ•ે āŠŽેંāŠ• āŠĩિāŠ—āŠĪો āŠĪેāŠŪāŠœ āŠĩ્āŠŊāŠ•્āŠĪિāŠ—āŠĪ āŠŪાāŠđિāŠĪી āŠŪાāŠŸે āŠŠૂāŠ›ે āŠ›ે.āŠĻોંāŠ§āŠĢી āŠ•āŠ°āŠĪી āŠĩāŠ–āŠĪે, āŠĪે āŠĪāŠŪāŠĻે āŠĪāŠŪાāŠ°ા āŠļ્āŠĨા...

āŠķું āŠĪāŠŪે āŠœાāŠĢો āŠ›ો āŠ•ે āŠđેāŠķāŠŸેāŠ—્āŠļ #couplechallenge āŠĻો āŠ‰āŠŠāŠŊોāŠ— āŠ•āŠ°ીāŠĻે, āŠĪāŠŪે āŠļાāŠŊāŠŽāŠ° āŠ•્āŠ°ાāŠ‡āŠŪāŠĻો āŠ­ોāŠ— āŠŽāŠĻી āŠķāŠ•ો āŠ›ો?

Awareness is necessity "Nohashtag challenges" āŠ†āŠœāŠ•ાāŠē, āŠļોāŠķિāŠŊāŠē āŠŪીāŠĄિāŠŊા āŠŠ્āŠēેāŠŸāŠŦોāŠ°્āŠŪ āŠŠāŠ° #couplechallenge, #smilechalenlenge, #chirichchallenge āŠŸ્āŠ°ેંāŠĄિંāŠ— āŠ›ે. āŠŠāŠ°ંāŠĪુ āŠķું āŠĪāŠŪે āŠđેāŠķāŠŸેāŠ—્āŠļāŠĻો āŠ‡āŠĪિāŠđાāŠļ āŠœાāŠĢો āŠ›ો? āŠšાāŠēો āŠŠāŠđેāŠēા āŠœોāŠˆāŠ āŠ•ે #hashtag āŠĻી āŠķોāŠ§ āŠ•ેāŠĩી āŠ°ીāŠĪે āŠĨāŠˆ. āŠļિāŠēિāŠ•ોāŠĻ āŠĩેāŠēીāŠŪાં āŠ•ાāŠŪ āŠ•āŠ°āŠĪા āŠŠ્āŠ°ોāŠĄāŠ•āŠŸ āŠĄિāŠાāŠ‡āŠĻāŠ° āŠ•્āŠ°િāŠļ āŠŪેāŠļિāŠĻા āŠ āŠđેāŠķāŠŸેāŠ—āŠĻો āŠ†āŠˆāŠĄિāŠŊા āŠŽāŠĻાāŠĩ્āŠŊો āŠđāŠĪો.āŠĪે āŠ…āŠĻે āŠĪેāŠĻા āŠ•āŠ°્āŠŪāŠšાāŠ°ીāŠ“ āŠŪિāŠĪ્āŠ°ો āŠĩિāŠšાāŠ°ી āŠ°āŠđ્āŠŊા āŠđāŠĪા āŠ•ે āŠŸ્āŠĩિāŠŸāŠ°āŠĻે āŠ•ેāŠŸāŠēાāŠ• āŠŪાāŠģāŠ–ાāŠĻી āŠœāŠ°ૂāŠ° āŠ›ે.āŠĪેāŠĻે āŠļાāŠŪે āŠŠાāŠ‰āŠĻ્āŠĄ āŠļિāŠŪ્āŠŽોāŠē āŠđāŠĪું āŠĪેāŠŪાંāŠĨી āŠđેāŠķāŠŸેāŠ— āŠ•āŠĻ્āŠļેāŠŠ્āŠŸ āŠŪāŠģ્āŠŊો.āŠđેāŠķāŠŸેāŠ— āŠŽāŠĻાāŠĩāŠĩાāŠĻો āŠĪેāŠŪāŠĻો āŠŪુāŠ–્āŠŊ āŠĩિāŠšાāŠ° āŠ‡āŠĻ્āŠŸāŠ°āŠĻેāŠŸāŠĻો āŠđāŠĪો, āŠ…āŠĻે āŠˆāŠš્āŠ›āŠĪા āŠđāŠĪા āŠ•ે āŠĩૈāŠķ્āŠĩિāŠ• āŠĩાāŠ°્āŠĪાāŠēાāŠŠāŠŪાં āŠ­ાāŠ— āŠēેāŠĩા āŠ‡āŠĻ્āŠŸāŠ°āŠĻેāŠŸ āŠŠāŠ° āŠ•ોāŠˆāŠŠāŠĢ āŠēāŠ–ાāŠĢ āŠēāŠ–ે. 2007 āŠŪાં, āŠĪેāŠĢે āŠĪેāŠĻા āŠāŠ• āŠŪિāŠĪ્āŠ°āŠĻે āŠĪેāŠĻા tweet āŠŪાāŠŸે #sandiego āŠĻો āŠ‰āŠŠāŠŊોāŠ— āŠ•āŠ°āŠĩા āŠ•āŠđ્āŠŊું āŠ…āŠĻે āŠ† āŠ°ીāŠĪે, āŠđેāŠķāŠŸેāŠ—āŠĻો āŠ‰āŠŠāŠŊોāŠ— āŠķāŠ°ૂ āŠĨāŠŊો. 2009 āŠŪાં, āŠŸ્āŠĩિāŠŸāŠ°ે āŠĪેāŠĻા āŠļāŠ°્āŠš āŠŽાāŠ°āŠŪાં āŠđેāŠķāŠŸેāŠ—āŠĻો āŠĩિāŠ•āŠē્āŠŠ āŠ‰āŠŪેāŠ°્āŠŊો. āŠ…āŠĻે āŠ† āŠ°ીāŠĪે, āŠđેāŠķāŠŸેāŠ— āŠāŠ• āŠĩāŠēāŠĢ āŠŽāŠĻી āŠđāŠĪી. āŠ† āŠĩāŠēāŠĢ āŠŠāŠ›ી āŠ…āŠĻ્āŠŊ āŠāŠŠ્āŠēિāŠ•ેāŠķāŠĻ્āŠļ āŠœેāŠĩી āŠ•ે āŠŸāŠŪ્āŠŽāŠēāŠ°, āŠŦેāŠļāŠŽુāŠ•, āŠ‡āŠĻ્āŠļ્āŠŸાāŠ—્āŠ°ાāŠŪ āŠ…āŠĻે āŠ…āŠĻ્āŠŊ social media āŠŠ્āŠēેāŠŸāŠŦોāŠ°્āŠŪ āŠļુāŠ§ી āŠĩિāŠļ્āŠĪāŠ°િāŠĪ āŠĨāŠŊો āŠđāŠĪો. āŠķāŠ°ૂāŠ†āŠĪāŠŪાં, āŠđેāŠķāŠŸેāŠ—...