All the latest UK technology news, reviews and analysis

Trend Micro warns of McDonald's gift card spam on Twitter

04 Jan 2012

McDonalds arches in a restaurant

Security experts at Trend Micro are warning users to be on their guard after they discovered yet another Twitter spam campaign, this time using fast food giant McDonalds as a lure.

Designed to cash-in on the trend for giving ‘gift cards' to friends and family during the festive season, this scam uses the hashtag #mcdonalds gift card and shortened URLs to trick users into clicking through to a dodgy link, according to Trend Micro fraud analyst Cris Lumague.

"McDonald's is a globally well-known fast food chain that, like many other establishments, do offer certificates and vouchers for patrons who would like to give these as gifts or rewards," he explained on the TrendLabs Malware blog.

"Unfortunately, closer inspection of the shortened link reveals a URL that doesn't seem to have anything to do with McDonald's gift certificates."

The link actually takes users to an adult dating site landing page, he said.

"We consider the URLs used in this attack as malicious because of the deceitful nature by which they are used," added Lumague.

As Lumague explains in the blog, it's not the first time McDonald's has been used as a spam lure and it won't be the last. Another interesting point to note is the increasing prevalence of such scams on Twitter.

The medium is now so popular that users must be aware that scammers and malware writers will be doing their best to spread their messages via tweets on the site.

In particular, users should take care when searching the general site for generic words and phrases as above, rather than solely among their contacts.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Phil Muncaster

Phil Muncaster is news editor at, a role he has fulfilled since January 2010. Previously he was chief reporter for IT Week, having also worked as a reporter and senior reporter on the publication from 2005.

Before IT Week, Phil worked as a researcher for the Rough Guide. Prior to his work in journalism, Phil spent three years teaching English in Japan.



More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Galaxy S5 vs iPhone 5S vs Nexus 5 showdown

Galaxy S5 vs iPhone 5S vs Nexus 5

We speed test three of the most popular smartphones

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

IT Systems Administrator

Abscissa.Com Limited trades as Jokers’ Masquerade, a...

PHP Team Lead

Holmes Media is seeking an experienced and highly motivated...

Network Engineer

Our Company: CGG ( is a fully...
To send to more than one email address, simply separate each address with a comma.