Connect with us

Technology

Fake Spotify voting scam exposed

Published

on

Fake Spotify voting scam exposed

NEWYou can now listen to Fox News articles!

It started with a simple favor. A friend asked for help voting so he could co-host a major podcast event with Spotify and Google. The first message looked casual. It felt personal. It even had urgency.

“Hey, I need a quick favor,” the message read. “I’m in the running to co-host a major podcast event with Spotify & Google. It’d mean a lot if you could drop a vote for me. Appreciate you!”

I almost clicked. Then I noticed the link. That one detail likely saved multiple accounts. Then came a follow-up text that turned up the pressure: “Please vote for me, I would really appreciate it as the voting will be ending today.”

A final message read, “Thanks, please send me a screenshot after you voted.”

Advertisement

That is when it stopped feeling like a favor and began to feel like a setup. Let’s break down what is really going on here.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

The scam unfolds in stages, starting with a friendly request and escalating to pressure and a demand for a screenshot to confirm you took the bait. (Kurt “CyberGuy” Knutsson)

What this Spotify voting text scam looks like

The message claims someone needs your vote to co-host a podcast event with Spotify and Google. It includes a link that looks official at first glance. But look closely.

The URL reads: spotifyprime-hub.ct.ws

Advertisement

That is not spotify.com. Major companies do not run events on random domains like ct.ws. Scammers register cheap lookalike domains because they are easy to create and hard to notice in a quick scroll. That tiny detail is the first red flag.

What the fake voting page looks like

The site looks clean. It feels polished and official. It even claims to be powered by Google. Then it gives you three options:

  • Continue with Instagram
  • Continue with Email
  • Continue with X

That is when you need to stop. This is not about voting. It is about collecting your login credentials.

ROBINHOOD TEXT SCAM WARNING: DO NOT CALL THIS NUMBER

The fake voting page looks convincing, but the login buttons reveal it is designed to steal your social media credentials. (Kurt “CyberGuy” Knutsson)

What gives this scam away?

If you slow down and look closely, several clear red flags jump out right away.

Advertisement

1. The web address

The domain is wrong. It is not spotify.com or google.com. Instead, it uses a random third-party address. That alone should stop you in your tracks.

2. The urgency

“Voting ends today.” “It would mean a lot.” Scammers rely on emotion and pressure. When you feel rushed, you stop analyzing. That is the goal.

3. The login buttons

A real voting page would not require your Instagram, email or X login. The moment a site asks you to sign in with unrelated platforms, you should assume credential harvesting, which is when scammers trick you into entering your username and password so they can steal your account.

What actually happened to someone who fell for it?

Here is what one victim shared after clicking:

“So I got that Twitter DM from a friend last week. I signed in to vote for him. It didn’t work. Then, a day later, they hacked my account and locked me out before I could change my password. I am still locked out, and it is apparently doing it to other people. Another friend got it from me and also got hacked and is locked out. They are trying to extort him to get access back. And today they tried to get into my bank accounts. It has been miserable.”

Advertisement

This is how fast it spreads. One login becomes 10. Ten becomes hundreds. It turns into a chain reaction.

What the scammers do after you log in?

The process is simple and brutal. First, you enter your username and password. Next, the scammer logs into your account within minutes. Then they change your password and recovery email. After that, they send the same “vote for me” message to everyone in your contacts.

If you reuse passwords, they may try those credentials on email, banking or shopping sites. This is a classic account takeover phishing scam.

Why do scammers ask for a screenshot?

This part is clever. After you “vote,” they ask for proof in the form of a screenshot. Here is why. First, it confirms you completed the login. Second, screenshots can expose usernames, email addresses or other visible details. Third, it keeps you engaged so you do not immediately realize something went wrong. However, the damage usually happens the moment you enter your credentials.

“We’re aware of phishing messages falsely claiming to be associated with Spotify and other brands,” a Spotify spokesperson told CyberGuy. “These messages are not from Spotify, are not connected to any official Spotify event or activity, and are not occurring on the Spotify platform. We encourage people to remain vigilant and avoid clicking on suspicious links.”

Advertisement

Meanwhile, a Google spokesperson pointed us to the company’s online guide for spotting and avoiding scams.

MICROSOFT ‘IMPORTANT MAIL’ EMAIL IS A SCAM: HOW TO SPOT IT

The Spotify logo is displayed on a screen on the floor of the New York Stock Exchange in New York on May 3, 2018. (REUTERS/Brendan McDermid/File Photo)

How to protect yourself from the Spotify voting scam

Now let’s talk prevention.

1. Always check the full URL

Look beyond the brand name in the message. If the domain is not the official company domain, do not click.

Advertisement

2. Slow down when you feel urgency

Scammers manufacture pressure. Real friends can wait.

3. Turn on two-factor authentication (2FA) 

Use app-based two-factor authentication (2FA) whenever possible. It adds a critical barrier.

4. Use strong antivirus software on your devices

Strong antivirus software can block known phishing sites, warn you about suspicious links and help prevent malicious downloads before damage is done. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

5. Never reuse passwords

Use a password manager to generate unique passwords for every account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

6. Verify with the person directly

If a friend sends something unusual, call or text them separately and ask if they meant to send it.

Advertisement

7. Check login activity regularly

Most social platforms let you review active sessions. If you see a login from an unfamiliar location or device, log out of all sessions immediately.

What to do if you already clicked

  • If you did not click, delete the message and warn your friend.
  • If you did click and enter credentials, act fast.
  • Change the password immediately.
  • Enable two-factor authentication.
  • Review login activity.
  • Change any other accounts that use the same password.

Time matters here, so don’t put this off.

Kurt’s key takeaways

There is no Spotify and Google podcast voting event running on a random ct.ws domain. The entire operation exists to steal social media credentials, hijack accounts and spread further. It looks polished. It feels personal. That is what makes it effective. The next time someone asks you for a quick vote, pause and inspect the link. That small moment of skepticism can prevent days of damage.

If a message came from someone you trust, would you still stop to inspect the link before clicking? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

YouTube TV billing scam emails are hitting inboxes
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Google’s latest Pixel Watches have fallen to their lowest prices ever

Published

on

Google’s latest Pixel Watches have fallen to their lowest prices ever

With longer days and warmer weather on the way, it’s a good time to take your gym routine outside. Luckily, Google’s Pixel Watch 4 can help you track all your outdoor fitness activities, and right now it’s on sale at Amazon, Best Buy, and Target starting at $289.99 ($60 off), a new low price. The last-gen Pixel Watch 3 is also currently the cheapest it’s ever been, with the 41mm / Wi-Fi configuration selling for $169.99 ($80 off) — also a new low — at Amazon, Best Buy, and Target.

The Pixel Watch 4 is our favorite Fitbit-powered smartwatch, one that offers a great feature set for the price. Google’s latest wearable features dual-frequency GPS, which improves accuracy in challenging environments such as cities and dense forests, and it can automatically record certain cardio activities on your behalf, including both running and cycling. It also offers improved sleep tracking, satellite SOS (on the LTE model), and a slew of AI features courtesy of Gemini — including an exclusive raise-to-talk gesture that’s useful while on a run.

The hardware has improved as well. Most notably, you can now replace and repair both the screen and the battery, making it a better long-term investment. The display is bigger and brighter, too, and the Pixel Watch 4 lasts about a day and a half on a single charge, or roughly 45 hours if you buy the 45mm model (up from 32 hours on the Watch 3). Charging is also faster, allowing you to charge it up to 80 percent capacity in under 30 minutes. And as a nice little extra, the included side-mounted charger lets you use the watch as a glanceable display, so you can see the battery percentage and other useful tidbits of info more easily.

If you want a great Android smartwatch for less, the last-gen Pixel Watch 3 is also a good option. While it’s not easily repairable like the Watch 4 and lacks some of the aforementioned upgrades (including dual-frequency GPS), it still offers a good set of health and fitness tools, allowing you to track your activity, sleep, blood oxygen levels, and heart rate. It also supports Gemini and integrates well with Google’s various services, letting you download offline maps and leave your wallet at home by paying via Google Wallet. You can even use it to control a slew of compatible devices from your wrist, from Nest cameras and video doorbells to the newest Google TV devices.

Continue Reading

Technology

You could be sharing your Social Security number when you don’t need to

Published

on

You could be sharing your Social Security number when you don’t need to

NEWYou can now listen to Fox News articles!

Some Social Security number requests are not optional. Federal reporting systems rely on the SSN as a primary identifier.

Employment offers the clearest example. Employers collect your SSN to report wages and file taxes, including Form W-2 submissions. The Social Security Administration credits your earnings record with it. The IRS uses it to match payroll taxes with reported income. Federal agencies also require your SSN when you apply for certain benefits or meet tax obligations. If you refuse to provide your SSN in these situations, you can delay processing or lose access to services.

However, not every form carries that authority. Landlords, medical offices, schools, gyms and retailers often include an SSN field by default. In those cases, ask why they need it and whether another identifier will work. So how do you tell when your SSN is truly required and when you can push back?

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Your Social Security number powers tax reporting and federal benefit systems, which is why some requests truly are mandatory. (AP Photo/Jenny Kane, File)

Examples of when you need to share your SSN

Certain U.S. laws and federal regulations require an SSN because it functions as the official taxpayer or benefits identifier.

Federal income tax returns: The IRS requires individuals who qualify for an SSN to use it as their taxpayer identification number on Form 1040 and related filings. The IRS uses the number to match income statements, credits and refunds to the correct taxpayer record.

Form W-2 wage reporting: IRS regulations require employers to include each employee’s SSN on Form W-2. Employers submit the form to both the IRS and the SSA so agencies can record earnings and reconcile payroll taxes.

Social Security retirement and disability benefits: Applications for Social Security benefits require an SSN so the SSA can retrieve the applicant’s earnings history and calculate eligibility and payment amounts.

Advertisement

ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

FAFSA for federal student aid: U.S. citizens and eligible noncitizens applying for federal student aid must provide a valid SSN on the Free Application for Federal Student Aid (FAFSA). The number is verified against SSA records during processing.

Interest income reporting: Financial institutions must obtain a taxpayer identification number — usually an SSN for individuals — to report interest income to the IRS on Form 1099-INT.

In each of these cases, the requirement stems from tax administration statutes or federal benefits law. The SSN is used to link records across agencies and systems.

When you don’t need to share your SSN

Beyond tax filings, wage reporting and federal benefits, many SSN requests come from internal company policy rather than statute. Private businesses are generally allowed to ask for your SSN. In most everyday transactions, there is no federal law forcing you to provide it.

Advertisement

Rental applications: Landlords often request an SSN to run credit checks. Federal housing law does not mandate collecting a tenant’s SSN to lease property. Screening is conducted through consumer reporting agencies, and alternative verification methods may be available.

Medical intake forms: Healthcare providers routinely include an SSN field. Federal law does not require patients to disclose an SSN for treatment. Since 2018, Medicare cards have used randomized beneficiary identifiers instead of SSNs. These Medicare Beneficiary Identifiers (MBI) don’t include your SSN.

School enrollment forms: Public schools may request a student’s SSN, but students cannot be denied enrollment for refusing to provide one. Institutions tend to assign their own identification numbers.

TAX SEASON SCAMS 2026: FAKE IRS MESSAGES STEALING IDENTITIES

Utilities and subscription services: Power companies, mobile carriers and gyms sometimes request an SSN to evaluate credit risk or secure payment agreements. This is a risk management choice, not a statutory requirement.

Advertisement

In these cases, the request may feel routine. The legal footing is different from tax or benefits administration. You can ask what authority requires it and whether another form of identification will suffice.

Not every form that asks for your SSN has legal authority behind it. Many requests are simply company policy. (Kurt “CyberGuy” Knutsson)

What to ask before you hand over your SSN

If the request comes from a government agency, look for a Privacy Act disclosure statement. Federal law requires agencies to state whether providing your SSN is mandatory or voluntary, cite the legal authority for the request, and explain how it will be used. If the request comes from a private company, ask direct questions:

Is this required by federal or state law?

What will the SSN be used for?

Advertisement

Can you accept the last four digits instead?

Is there an alternative way to verify identity?

You can also ask how the number will be stored, whether it is encrypted and who has access to it. Collecting only what is necessary is a recognized security practice, but not every organization follows it.

What actually happens when your SSN is leaked

A leaked or stolen SSN can be used anywhere that number is treated as proof of identity.

In tax administration, the IRS processes returns based on the SSN attached to them. If a fraudulent return is filed first, the legitimate taxpayer’s electronic filing may be rejected because the number has already been used. Fixing it means paper filing and identity verification while the IRS reviews the case. The agency’s Identity Protection PIN program was introduced after years of SSN-based tax fraud.

Advertisement

Credit reporting works the same way. Under the Fair Credit Reporting Act framework, credit bureaus use the SSN to build and match consumer files. If credit is issued using your SSN, that account can attach to your report until you dispute it. It stays there while bureaus and lenders investigate.

Federal benefit systems also depend on the number. The SSA warns that criminals use stolen SSNs to impersonate beneficiaries and create fraudulent online accounts. An SSN does not expire or reset. Once exposed, it can continue appearing in tax filings, credit applications, or benefit records until you flag it.

How identity monitoring services help you respond faster

Identity monitoring services attempt to detect suspicious activity tied to your personal information as early as possible. Many services track credit activity across all three major U.S. bureaus and alert you to new inquiries, accounts and report changes. Some also scan known data breach datasets for exposed identifiers, including Social Security numbers.

Certain plans include identity theft insurance to cover eligible recovery costs, along with fraud resolution support to guide you through disputes and paperwork if something goes wrong.

No service can prevent every type of identity theft. The real value is early warning, knowing when and where your SSN is being used so you can act quickly before damage spreads.

Advertisement

How to check if your personal information was exposed

If you are unsure whether your personal information has been compromised, take action. Start with a reputable breach scan to see whether your email or other identifiers appear in known leaks. Early detection gives you more control and helps you respond before fraud escalates.

See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.

Before handing it over, ask how your SSN will be used, stored and protected. That simple pause can reduce your risk.  (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

Lawmakers created the Social Security number to track earnings and administer benefits, not to unlock every part of your life. Yet today, many companies treat it like a universal key. In some situations, you must provide your SSN. Taxes, employment and federal benefits depend on it. However, many everyday requests come from internal company policies, not federal law. That distinction matters. Before you share your number, pause and ask why the business needs it. Ask how they store it. Ask whether another form of identification will work. Small questions can prevent big problems. If someone has exposed your SSN, act quickly. Monitor your credit. Set up alerts. Report suspicious activity right away. Early action limits damage and protects your identity. Your Social Security number does not change. But you control when, where and how you share it.

Have you ever been asked for your Social Security number in a situation that didn’t feel necessary, and did you push back? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Apple is going high-end with new ‘Ultra’ products next

Published

on

Apple is going high-end with new ‘Ultra’ products next

Fresh off launching the low-cost MacBook Neo, Apple is reportedly preparing at least three new products that will fit into its highest-end “ultra” lineup. According to Bloomberg’s Mark Gruman, the next batch of releases may not bear the “ultra” name, like its Watch, but will all command price premiums over their mainline counterparts.

There’s the oft-rumored foldable iPhone, which is expected to cost around $2,000, and a touchscreen MacBook Pro is supposedly slated for the fall. Those are pretty straightforward plays for the higher end of the market. More interesting are the next-gen AirPods, which are rumored to include cameras to feed visual context to Siri. Since AirPods already use the Pro and Max branding, similar to Apple Silicon, a set of AirPods Ultra could very well be on the docket.

Between the Neo and multiple foldables in the works, it seems that Apple is simultaneously trying to go further up- and down-market.

Continue Reading

Trending