Fake RayBan Shopping Scam!

Several of our users and social media followers have sent this post in. This one is from Instagram, but if you find it on any other social media platform, please disregard. IT IS A SCAM!

There are many version of this. They generally consist of the Ray-Ban logo and claims to offer “90% off” and of-course with a prompt of “better hurry, only one day sale”.

THIS IS A FAKE WEBSITE. If something is too good to be true, it probably is. If you send in the money, please understand that you will not be receiving any Ray-Bans. Some say that the Ray-Bans could be fake. Nonetheless, always be aware when you see posts like this that give you a time period like 24HRS.

The Scam Plot

This is a psychological attack by scammers to make you send money quickly without thinking through what you are buying. This works because it has individuals thinking that they are running out of time and could be potentially missing out on a deal. Don’t fall for it! Always think through your purchase, especially in cases like this where the price has dramatically dropped.

The website is a phishing plot to steal your personal info and instagram login information. It is designed to lure unwitting victims to type in their details into the website. And once the account is hijacked, the scammers can use your account to spread the details to even more people.

How to Avoid

If the promotion on Social media looks too good to be true, it probably is. Avoid clicking any suspicious links that has unrealistically temping offers.

If you did enter your details into the website, make sure to go into your instagram and log out of all your sessions and change your password.

It is often good idea to set up two factor authentication so that your account is more secure and gives you an extra-layer of security.

If you see a friend has posted this ad, make sure to warn them and ask them to remove the posts to prevent more people from falling victim.

Related Articles

Avoid Identity Theft

[vc_row full_width=”container” css=”.vc_custom_1593018622351{margin-top: 5% !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][vc_column width=”1/1″][vc_column_text class=”heading”] What is identity theft?…


Your email address will not be published. Required fields are marked *


Domain: dropbox.com

Established: 1995-06-28

Server IP Address:

Domain Blacklisted: No

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that blocks all malicious elements (email addresses, websites users, …)

Suspended Site: No

When your website account is suspended, it means the hosting provider has temporarily taken it offline. Website hosts often suspend websites for a myriad of reasons ranging from malware to spam.

Email (MX) Configured: Yes

Verification that the website has its entity’s proper IMAP (Inbox) and SMTP (Outbox) mailbox servers configured correctly.

DMARC Configured: Yes

DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC), and other email-based attacks.

SSL Cert Blacklisted: No

Hackers have discovered ways to circumvent, alter, or abuse SSL certificates. An SSL certificate blacklist is a list of untrustworthy SSL certificates that have been created and can potentially harm users.

Website Popular: No

Risky TLD: No

The TLD (Top Level Domain) are the last characters of an entity’s website name, such as .com, .org, etc. Cyber-criminals and threat actors prefer a small set of 25 out of the thousands of available extensions, which accounts for 90% of all malicious sites. A Risky TLD is verification that the domain name is not to be trusted.

Heuristic Pattern: No

If a website uses Heuristics, then it is a scanning method that looks for malware-like behavior patterns. It is commonly used to detect new or not-yet-known malware.

Risky Geolocation: No

Verification to an entity’s geolocation status being labeled as ‘Risky’.

Suspicious Domain: No

Verification the entity’s domain is not listed as being “Suspicious”.