How the scam works:
(with video below) Millions of people eat at McDonald's, Pizza Hut, or Wendy's every day – it's a fact. Reproducing the brands' graphics, scammers advertise free meals at the most popular fast-food chains in the world. The recipients of the message have to open the coupon attached to the email and print it, so they can bring it to the store to redeem their meal. How does the scam work?
Watch the video below to see the Free Fast Food Coupon scam exposed:
The latest two scams come as a free pizza at Pizza Hut and a $250 gift card at McDonald's. The first one has the subject title as: "Free Pizza". The e-mail address used is firstname.lastname@example.org but it could be from any other one, as fraudsters send mass emails from various IP addresses.
The content of the e-mail reads:
"Free Personal Pizza
Today we are celebrating our 58th anniversary and we want you to share this celebration with us – you may get a free pizza in any of our restaurants.
Get Free Pizza Coupon Here" (compromised link provided)
They even say the offer is valid through next month. The only problem is, the attachment contains a very serious virus. It could be malware or a keylogger, which will compromise your computer. The domain name this email was used from (Dreamhunters dot biz) has its origins in Russia.
How to avoid:
You know what they say, there is no such thing as a free lunch. Make sure you know how to differentiate the criminals' emails from the authentic ones– look for misspells in the company's name (for example, McDonalds instead of McDonald's) and in the domain name of the email address (it could be spelled mcdonallds.com).
When in doubt, go to the official website by typing it yourself in the browser.
How to report:
Make your family and friends aware of this scam by sharing it on social media using the buttons provided. You can also officially report the scammers to the Federal Trade Commission using the link below:
Verify a website below
Are you just about to make a purchase online? See if the website is legit with our validator: