{"id":225119,"date":"2026-01-09T11:34:58","date_gmt":"2026-01-09T19:34:58","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=225119"},"modified":"2026-01-09T11:34:58","modified_gmt":"2026-01-09T19:34:58","slug":"this-week-in-scams-explaining-the-fake-amazon-code-surge","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/","title":{"rendered":"This Week in Scams: Explaining the Fake Amazon Code Surge"},"content":{"rendered":"<p><span data-contrast=\"auto\">This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended seamlessly into platforms people already trust.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Every week, we bring you a roundup of the\u00a0scams\u00a0making headlines, not just to track\u00a0what\u2019s\u00a0happening, but to explain\u00a0<\/span><i><span data-contrast=\"auto\">how<\/span><\/i><span data-contrast=\"auto\">\u00a0these schemes work,\u00a0<\/span><i><span data-contrast=\"auto\">why<\/span><\/i><span data-contrast=\"auto\">\u00a0they\u2019re\u00a0spreading now, and what you can do to stay ahead of them.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Here are\u00a0scams\u00a0in the news\u00a0this week,<\/span><\/b><span data-contrast=\"auto\">\u00a0and\u00a0safety tips from our\u00a0experts at McAfee:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Amazon One-Time Passcode Scam: How Fake Security Calls Hijack Real Accounts<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Scammers are <a href=\"https:\/\/www.which.co.uk\/news\/article\/beware-of-amazon-one-time-passcode-scams-aAkPb4K9OrMD\" target=\"_blank\" rel=\"noopener\">increasingly impersonating Amazon customer support<\/a> to take over accounts using\u00a0<\/span><b><span data-contrast=\"auto\">real one-time passcodes (OTPs),\u00a0<\/span><\/b><span data-contrast=\"auto\">not fake\u00a0links\u00a0or malware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here\u2019s\u00a0how the\u00a0scam\u00a0works in practice.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">What is the Amazon one-time passcode\u00a0scam?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Victims receive an unsolicited phone call from someone claiming to work for\u00a0<\/span><b><span data-contrast=\"auto\">Amazon<\/span><\/b><span data-contrast=\"auto\">. The caller says suspicious activity has been detected on the account and may reference expensive purchases,\u00a0often items like smartphones,\u00a0to make the threat feel credible.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The call usually comes from a spoofed\u00a0number\u00a0and the scammer may already know your name or phone number, which helps lower suspicion.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">How scammers use real Amazon security codes<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">While speaking to you, the scammer\u00a0attempts\u00a0to access your Amazon account themselves by entering your phone number or email address on the login page and selecting \u201cforgot password\u201d or triggering a login from a new device.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That action causes Amazon\u2019s real security system to send a\u00a0<\/span><b><span data-contrast=\"auto\">legitimate one-time passcode<\/span><\/b><span data-contrast=\"auto\">\u00a0to your phone or email.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If you read that code aloud or share it, the scammer can\u00a0immediately:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Complete the login process<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Change your account password<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Access saved payment methods<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Place fraudulent orders or lock you out of the account<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">The\u00a0scam\u00a0works precisely because the code is real\u2014and because it arrives while the caller is convincing you\u00a0it\u2019s\u00a0part of a routine security check.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Key red flags to watch for<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">Unsolicited calls claiming to be from Amazon<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Requests to share a one-time passcode<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Pressure to act quickly \u201cto secure your account\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">Important to remember:<\/span><\/b><span data-contrast=\"auto\">\u00a0Amazon will never contact you first to ask for your password, verification codes, or security details. If you receive a one-time passcode you\u00a0didn\u2019t\u00a0request, do not share it with anyone.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">AI Deepfake Scam on TikTok Uses Fake Princess to Steal Money<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A growing\u00a0scam\u00a0on\u00a0<\/span><span data-contrast=\"auto\">TikTok\u00a0<\/span><span data-contrast=\"auto\">shows how AI-generated deepfake videos are now being used not just for misinformation, but for direct financial fraud.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This week, Spanish media and officials warned that scammers are circulating fake TikTok videos appearing to show Princess Leonor, the 20-year-old heir to Spain\u2019s throne, offering financial\u00a0assistance\u00a0to users.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.theguardian.com\/world\/2026\/jan\/06\/tiktok-scam-warning-ai-videos-princess-leonor-spain\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">According to The Guardian<\/span><\/a><span data-contrast=\"auto\">, the videos show an AI-generated version of Leonor promising payouts running into the thousands of dollars in exchange for a small upfront \u201cfee.\u201d\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Once victims send that initial payment, the\u00a0scam\u00a0doesn\u2019t\u00a0end. Fraudsters repeatedly demand\u00a0additional\u00a0fees before eventually disappearing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This case highlights how deepfakes are moving beyond novelty and into\u00a0<\/span><b><span data-contrast=\"auto\">repeatable, high-reach fraud<\/span><\/b><span data-contrast=\"auto\">, where trust in familiar public figures is weaponized at scale.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Viral Reddit \u201cWhistleblower\u201d Scam: When AI-Generated Posts Fool Millions<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A viral post on\u00a0<\/span><b><span data-contrast=\"auto\">Reddit<\/span><\/b><span data-contrast=\"auto\">\u00a0this week shows how AI-generated text can convincingly impersonate\u00a0whistleblowers, and\u00a0even mislead experienced journalists.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The post claimed to come from an employee at a major food delivery company, alleging the firm was exploiting drivers and users through opaque AI systems. Written as a long, confessional screed, the author said he was drunk, using library Wi-Fi, and risking retaliation to expose the truth.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The claims were believable in part because similar companies have faced real lawsuits in the past. The post rocketed to Reddit\u2019s front page, collecting\u00a0<\/span><b><span data-contrast=\"auto\">over 87,000 upvotes<\/span><\/b><span data-contrast=\"auto\">, and spread even further after being reposted on X, where it amassed tens of millions of impressions.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.platformer.news\/fake-uber-eats-whisleblower-hoax-debunked\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">As\u00a0<\/span><i><span data-contrast=\"none\">Platformer<\/span><\/i><span data-contrast=\"none\">\u00a0journalist Casey Newton later reported<\/span><\/a><span data-contrast=\"auto\">, the\u00a0supposed whistleblower\u00a0provided\u00a0what appeared to be convincing\u00a0evidence,\u00a0including a photo of an employee badge and an 18-page internal document describing an AI-driven \u201cdesperation score\u201d used to manage drivers. But during verification attempts, red flags\u00a0emerged. The materials were\u00a0ultimately traced\u00a0back to an AI-generated hoax.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Detection tools later confirmed that some of the images\u00a0contained\u00a0AI watermarks, but only after the post had already gone viral.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Why AI-generated hoaxes like this are dangerous<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">They mimic real whistleblower\u00a0behavior\u00a0and language<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">They exploit existing public distrust of large platforms<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">They can mislead journalists, not just casual readers<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Debunking often comes too late to stop spread<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">This incident underscores a growing problem:\u00a0<\/span><b><span data-contrast=\"auto\">AI-generated misinformation\u00a0doesn\u2019t\u00a0need to steal money directly to cause harm<\/span><\/b><span data-contrast=\"auto\">. Sometimes, the damage is to trust itself \u2014 and by the time the truth surfaces, the narrative has already taken hold.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">McAfee\u2019s Safety Tips for This Week<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">As\u00a0scams\u00a0increasingly rely on\u00a0a combination of\u00a0realism\u00a0and\u00a0urgency, protecting yourself starts with slowing down and verifying before you act.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">If a message or video promises money or financial help:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">Be\u00a0skeptical\u00a0of any offer that requires an upfront \u201cfee,\u201d no matter how small.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Remember that public figures, charities, and foundations do not distribute money through social media DMs or comment sections.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">If an offer claims to come from a well-known individual or organization, verify it through official websites or trusted news sources.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3><b><span data-contrast=\"auto\">When content appears viral or emotionally convincing:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">Pause before sharing or acting on posts framed as warnings, whistleblower revelations, or expos\u00e9s.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Look for confirmation from multiple reputable outlets \u2014 not just screenshots or reposts.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Be cautious of long, detailed posts that feel personal or confessional but\u00a0can\u2019t\u00a0be independently verified.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3><b><span data-contrast=\"auto\">When AI may be involved:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">Assume that realistic images, videos, and documents can be generated quickly and at scale.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Don\u2019t\u00a0rely on appearance alone to\u00a0determine\u00a0authenticity,\u00a0even high-quality content can be fake.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Treat unsolicited financial requests, account actions, or \u201cinside information\u201d as red flags, regardless of how credible they seem.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3><b><span data-contrast=\"auto\">If you think\u00a0you\u2019ve\u00a0engaged with a\u00a0scam:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">Stop responding\u00a0immediately.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Secure your accounts by changing passwords and enabling multi-factor authentication.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Monitor financial statements and account activity for unusual\u00a0behavior.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Final Takeaway<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The\u00a0scams\u00a0making headlines this week share a common theme: they\u00a0don\u2019t\u00a0look like\u00a0scams\u00a0at first glance. Whether\u00a0it\u2019s\u00a0an AI-generated video of a public figure or a viral post posing as a consumer warning, today\u2019s fraud relies on familiarity, credibility, and trust.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a class=\"Hyperlink SCXW54745705 BCX0\" href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW54745705 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54745705 BCX0\" data-ccp-charstyle=\"Hyperlink\">That&#8217;s why McAfee\u2019s Scam Detector<\/span><\/span><\/a><span class=\"TextRun SCXW54745705 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW54745705 BCX0\">\u00a0and\u00a0<\/span><\/span><a class=\"Hyperlink SCXW54745705 BCX0\" href=\"https:\/\/www.mcafee.com\/learn\/web-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW54745705 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54745705 BCX0\" data-ccp-charstyle=\"Hyperlink\">Web Protection<\/span><\/span><\/a><span class=\"TextRun SCXW54745705 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW54745705 BCX0\">\u00a0help detect\u00a0<\/span><span class=\"NormalTextRun SCXW54745705 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW54745705 BCX0\">\u00a0messages, dangerous sites, and AI-generated deepfake videos<\/span><span class=\"NormalTextRun SCXW54745705 BCX0\">,\u00a0<\/span><span class=\"NormalTextRun SCXW54745705 BCX0\">alerting you before you interact or click.<\/span><\/span><span class=\"EOP SCXW54745705 BCX0\" data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We\u2019ll\u00a0be back next week with another roundup of the\u00a0scams\u00a0worth watching, the stories behind them, and the steps you can take to stay one step ahead.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":209505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,13,12],"tags":[],"coauthors":[16632],"class_list":["post-225119","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-privacy-identity-protection","category-family-safety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This Week in Scams: Explaining the Fake Amazon Code Surge | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Scams: Explaining the Fake Amazon Code Surge | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-09T19:34:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"This Week in Scams: Explaining the Fake Amazon Code Surge\",\"datePublished\":\"2026-01-09T19:34:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png\",\"articleSection\":[\"Security News\",\"Privacy &amp; Identity Protection\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/\",\"name\":\"This Week in Scams: Explaining the Fake Amazon Code Surge | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png\",\"datePublished\":\"2026-01-09T19:34:58+00:00\",\"description\":\"This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png\",\"width\":600,\"height\":400,\"caption\":\"blogging on social media\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Scams: Explaining the Fake Amazon Code Surge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Scams: Explaining the Fake Amazon Code Surge | McAfee Blog","description":"This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"This Week in Scams: Explaining the Fake Amazon Code Surge | McAfee Blog","og_description":"This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended","og_url":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2026-01-09T19:34:58+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"This Week in Scams: Explaining the Fake Amazon Code Surge","datePublished":"2026-01-09T19:34:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png","articleSection":["Security News","Privacy &amp; Identity Protection","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/","url":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/","name":"This Week in Scams: Explaining the Fake Amazon Code Surge | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png","datePublished":"2026-01-09T19:34:58+00:00","description":"This week in scams, the biggest threats showed up as routine security messages, viral consumer \u201cwarnings,\u201d and AI-generated content that blended","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Social-Media-Scams-1.png","width":600,"height":400,"caption":"blogging on social media"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-explaining-the-fake-amazon-code-surge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.mcafee.com\/blogs\/security-news\/"},{"@type":"ListItem","position":3,"name":"This Week in Scams: Explaining the Fake Amazon Code Surge"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/225119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=225119"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/225119\/revisions"}],"predecessor-version":[{"id":225122,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/225119\/revisions\/225122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/209505"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=225119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=225119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=225119"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=225119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}