{"id":134300,"date":"2024-05-23T06:00:00","date_gmt":"2024-05-23T13:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=134300"},"modified":"2025-05-29T09:40:02","modified_gmt":"2025-05-29T16:40:02","slug":"cyber-signals-inside-the-growing-risk-of-gift-card-fraud","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/","title":{"rendered":"Cyber Signals: Inside the growing risk of gift card fraud"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Intelligence has observed that gift cards are attractive targets for fraud and social engineering practices. Unlike credit or debit cards, there\u2019s no customer name or bank account attached to them, which can lessen scrutiny of their potentially suspicious use in some cases and present cybercriminals with a different type of payment card surface to study and exploit. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has seen an uptick in activity from threat actor group Storm-0539, also known as Atlas Lion, around the United States holidays, including Memorial Day, Labor Day, Thanksgiving, Black Friday, and Christmas. In advance of Memorial Day 2024, Microsoft has observed a 30% increase in activity from Storm-0539 between March and May 2024.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The latest edition of <a href=\"https:\/\/news.microsoft.com\/wp-content\/uploads\/prod\/sites\/626\/2024\/05\/Cyber_Signals_Issue_7_May_2024-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Signals<\/a> dives deep into the world of gift card fraud, shedding light on Storm-0539 and its sophisticated cybercrime techniques and persistence, while providing guidance to retailers on how to stay ahead of these risks.<\/p>\n\n\n\n<div class=\"alignwide is-style-vertical wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t<h2 class=\"wp-block-heading\">Cyber Signals<\/h2><p class=\"wp-block-paragraph\">The latest report describes how organizations can protect gift cards from Storm-0539&#8217;s cybercrime techniques.<\/p><div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-full-width-on-mobile\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/news.microsoft.com\/wp-content\/uploads\/prod\/sites\/626\/2024\/05\/Cyber_Signals_Issue_7_May_2024-2.pdf\">Read the report<\/a><\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-scaled.jpg\" class=\"attachment-full size-full\" alt=\"Shop clerk in a clothing boutique taking a credit card payment on a digital tablet.\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-scaled.jpg 2560w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-300x300.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-1024x1024.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-150x150.jpg 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-768x768.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-1536x1536.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/MSC24-Japan-business-Getty-1145785115-rgb-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-storm-0539-atlas-lion\">The evolution of Storm-0539 (Atlas Lion)<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Active since late 2021, this cybercrime group represents an evolution of threat actors who previously specialized in malware attacks on point-of-sale (POS) devices like retail cash registers and kiosks to compromise payment card data, and today they are adapting to target cloud and identity services in steadily attacking the payment and card systems associated with large retailers, luxury brands, and well-known fast food restaurants.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"sophisticated-strategies\">Sophisticated strategies<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">What sets Storm-0539 apart is its deep understanding of cloud environments, which it exploits to conduct reconnaissance on organizations\u2019 gift card issuance processes and employee access. Its approach to compromising cloud systems for far-reaching identity and access privileges mirrors the tradecraft and sophistication typically seen in nation-state-sponsored threat actors, except instead of gathering email or documents for espionage, Storm-0539 gains and uses persistent access to hijack accounts and create gift cards for malicious purposes and does not target consumers exclusively. After gaining access to an initial session and token, Storm-0539 will register its own malicious devices to victim networks for subsequent secondary authentication prompts, effectively bypassing multifactor authentication protections and persisting in an environment using the now fully compromised identity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-cloak-of-legitimacy\">A cloak of legitimacy<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To remain undetected, Storm-0539 adopts the guise of legitimate organizations, obtaining resources from cloud providers under the pretense of being non-profits. It creates convincing websites, often with misleading \u201ctyposquatting\u201d domain names a few characters different from authentic websites, to lure unsuspecting victims, further demonstrating its cunning and resourcefulness.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"defending-against-the-storm\">Defending against the storm<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Organizations that issue gift cards should treat their gift card portals as high-value targets for cybercriminals and should focus on continuous monitoring, and audit for anomalous activities. Implementing <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-conditional-access\">conditional access<\/a> policies and educating security teams on social engineering tactics are crucial steps in fortifying defenses against such sophisticated actors. Given Storm-0539&#8217;s sophistication and deep knowledge of cloud environments, it is recommended that you also invest in cloud security best practices, implement sign-in risk policies, transition to phishing-resistant <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-mfa-multi-factor-authentication\">multifactor authentication<\/a>, and apply the least privilege access principle.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By adopting these measures, organizations can enhance their resilience against focused cybercriminals like Storm-0539, while keeping trusted gift, payment, and other card options as attractive and flexible amenities for customers.&nbsp;To learn more about the latest threat intelligence insights, visit <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\">Microsoft Security Insider<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. The latest edition of Cyber Signals dives deep into the world of Storm-0539, also known as Atlas Lion, shedding light on their sophisticated methods of gift and payment card theft.<\/p>\n","protected":false},"author":162,"featured_media":134378,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[],"threat-intelligence":[],"content-type":[3663],"job-role":[],"product":[],"topic":[3664,3678,3684],"coauthors":[2400],"class_list":["post-134300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-ai-and-machine-learning","topic-multifactor-authentication","topic-security-operations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Signals: Inside the growing risk of gift card fraud | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Signals: Inside the growing risk of gift card fraud | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. The latest edition of Cyber Signals dives deep into the world of Storm-0539, also known as Atlas Lion, shedding light on their sophisticated methods of gift and payment card theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T16:40:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1260\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vasu Jakkal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasu Jakkal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/\",\"@type\":\"Person\",\"@name\":\"Vasu Jakkal\"}],\"headline\":\"Cyber Signals: Inside the growing risk of gift card fraud\",\"datePublished\":\"2024-05-23T13:00:00+00:00\",\"dateModified\":\"2025-05-29T16:40:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\",\"name\":\"Cyber Signals: Inside the growing risk of gift card fraud | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp\",\"datePublished\":\"2024-05-23T13:00:00+00:00\",\"dateModified\":\"2025-05-29T16:40:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp\",\"width\":1260,\"height\":708,\"caption\":\"Graphic with illustrations of gift cards.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Signals: Inside the growing risk of gift card fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b\",\"name\":\"Christine Barrett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"caption\":\"Christine Barrett\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Signals: Inside the growing risk of gift card fraud | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Signals: Inside the growing risk of gift card fraud | Microsoft Security Blog","og_description":"In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. The latest edition of Cyber Signals dives deep into the world of Storm-0539, also known as Atlas Lion, shedding light on their sophisticated methods of gift and payment card theft.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/","og_site_name":"Microsoft Security Blog","article_published_time":"2024-05-23T13:00:00+00:00","article_modified_time":"2025-05-29T16:40:02+00:00","og_image":[{"width":1260,"height":708,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.png","type":"image\/png"}],"author":"Vasu Jakkal","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.png","twitter_misc":{"Written by":"Vasu Jakkal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/","@type":"Person","@name":"Vasu Jakkal"}],"headline":"Cyber Signals: Inside the growing risk of gift card fraud","datePublished":"2024-05-23T13:00:00+00:00","dateModified":"2025-05-29T16:40:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/","name":"Cyber Signals: Inside the growing risk of gift card fraud | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp","datePublished":"2024-05-23T13:00:00+00:00","dateModified":"2025-05-29T16:40:02+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/1260x708_Microsoft_CyberSignals7_Blog_Image.webp","width":1260,"height":708,"caption":"Graphic with illustrations of gift cards."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Signals: Inside the growing risk of gift card fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b","name":"Christine Barrett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db","url":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","caption":"Christine Barrett"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/134300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=134300"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/134300\/revisions"}],"predecessor-version":[{"id":139136,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/134300\/revisions\/139136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/134378"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=134300"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=134300"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=134300"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=134300"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=134300"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=134300"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=134300"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=134300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}