Elon Musk Tracts Victims on Facebook with Tesla deception
NEWNow you can listen to Fox News articles!
He started with a Facebook friend request and a message that felt too good to be true.
Then, it quickly became a expensive online deception lesson.
The woman with whom it happened in Jensen Beach, Florida, wrote us saying: “I kept telling me that it was my lucky day. I had just won a new white tesla and $ 250,000 in cash. All I needed to do was send him an Apple gift card for $ 200. So I did it. Well, $ 800 later, I wanted to pay more for the broken truck that was on my way to deliver my ways.”
The scammer, who passes through Elon Musk, used fucking, false urgency and a convincing profile to attract the victim to a carefully staging hoax. Behind the big promises was someone who left with hundreds of dollars on non -traceable gift cards. This is how the scam works and how it can avoid falling into it.
Register for my free Cyberguy report
Get my best technological tips, urgent security alerts and exclusive offers delivered directly to your inbox. In addition, you will get instant access to my definitive scam survival guide, free when you join.
A closed call with a Facebook scam that tried to steal credit card information

A person who proves a Tesla vehicle. (Kurt “Cyberguy” Knutsson)
How the Facebook scam of Elon Musk Tesla Facebook works
This type of scam often begins after someone publishes about musk, tesla or cryptocurrency. The scammers monitor the public activity of Facebook, then send a friend request from an account using the name and photo of Musk. The profile may seem legitimate, with copied images, repossed news articles or content generated by AI.
Once the application is accepted, the imitator encourages the victim to continue the conversation in WhatsApp. From there, the scam develops in a way that feels casual but calculated. He congratulates the victim for being randomly selected to win a new Tesla and a cash prize, often around $ 250,000. But before the reward can be delivered, they are told to cover “delivery rates” using an Apple gift card.
In the case of Jensen Beach’s wife, he sent multiple gift cards for a total of $ 800 before realizing that the story was a configuration. After stating that a cast truck had broken, the scammer requested even more money. It was then that he recognized the employer and blocked the account. But unfortunately, by then, the funds had already left.

A Facebook application on a smartphone. (Kurt “Cyberguy” Knutsson)
Spot Fake online and avoid Facebook subscription scams
Why the scammers prefer gift cards in online scams
Gift cards are one of the most common tools used in the scams because they are fast, anonymous and almost impossible to recover once the code is shared. Scammers often claim that cards are necessary to cover rates, unlock an award or verify their identity. Once a scammer has the code, he can do some things:
- Spend the balance immediately on digital goods or services
- Sell the card in the market in line with a discount
- Wash the funds through resale sites or game platforms.
Apple gift cards are frequently used because they are easy to find in stores and can be used for high value digital purchases. But scammers also use Google Play, Amazon, Steam and Visa, depending on what they think the victim can access. These requests generally come urgently. The victims can be told to remain on the phone while buying the cards or scratching the back and sending a photo of the code immediately. That pressure sensation is designed to cancel second thoughts. If someone who does not know, request payment on gift cards, is a scam. No legitimate organization or contest will ask them as payment or verification.
Goal faces the growing scrutiny about widespread scam ads
Other ELON MUSK Supplant scams to know about
The scams that are made by celebrities or public figures have become increasingly common. Criminals use well -known names to create a false sense of trust and urgency. Once they have their attention, they use that confidence to steal money or personal information. Musk is one of the most frequent figures in scam campaigns. His name is widely associated with innovation, cryptography and high value gifts, which makes it a perfect goal for scammers trying to seem legitimate. Some of the most common scams related to Elon include:
- Energy saving devices scams: A scam used Musk’s photo and false testimonies to promote a suspicious energy product through Facebook ads. The announcement was designed to look like a real news article, which made it difficult to detect false. Read more about the energy saving scam here.
- False investment opportunities: In one case, a scammer convinced a woman who was in a relationship with Musk and persuaded her to invest in a commercial company. She lost more than $ 26,000 before realizing that it was a hoax.
- Live cryptographic raffle: These scams often appear on YouTube or ads, claiming that Musk is organizing a raffle. Victims are told to send cryptocurrencies with the promise of obtaining double in return. Actually, money is taken and never returns.
What unites these scams is the use of a family face for minor suspicions. The scammer can use deep videos, voice clips generated by AI or manipulated screen catches so that the offer feels more real. Once the goal is involved, the pressure begins. Victims are asked to send money, act quickly and avoid telling anyone. If a message or announcement involves a celebrity that offers free money, discount products or special access to a private opportunity, it is almost certain that it is a scam.
What is artificial intelligence (AI)?

A Facebook application on a smartphone. (Kurt “Cyberguy” Knutsson)
Ai risks of cybersecurity and deep defake scams
How to protect yourself from Elon Musk’s gift scams
These scams are based on fast decisions, emotional reactions and a false sense of trust. Reducing and verifying the warning signals can help you stay safe. Here are some practical steps:
1. Never send gift card codes to anyone who does not know: If someone asks Apple, Amazon or Google Play cards as payment or verification, it is a scam. No real award, agency or company will request gift cards.
2. Be skeptical of celebrity account awards claims: Musk is not sending messages to people on Facebook to give teslas or effective. If the profile is not verified or the offer feels random, trust your instincts and ignore.
3. Do not move conversations to private applications such as WhatsApp or Telegram: Scammers often press this because these platforms have less safeguards, without threads of public comments and limited reports tools. Once the chat moves from Facebook, it becomes much harder to verify or inform what is happening. If someone who does not know insists on changing platforms, it is usually a sign that they are hiding something.
4. Consider using a data disposal service: If a scammer has attacked or struggled online, it is likely that his personal information floats on Data Broker websites. These sites collect and sell everything from the direction of their home to the names of their family members, which makes it a larger goal for future scams. Data removal services can help you scan the web and request the elimination of your information from these corridors. While you can do this manually, it takes a long time. Services such as Incogni offer subscriptions that automate the process and monitor new exhibitions. If it has been cheated or suspected that your information leaked, the use of a data removal service adds another layer of protection and tranquility. See my best selections to obtain data disposal services here.
Get a free scan To find out if your personal information is now available on the web
5. Be attentive to common red flags: Be careful with the sudden requests of friendship of unknown accounts, vague messages that mention surprise profits, a poor grammar or any pressure to act quickly. Staff of often use emotional triggers to cancel their judgment. If something feels off or too convenient, it probably is.
6. Install strong antivirus software on all devices: Some impersonation scams include links to phishing or malware pages. Antivirus tools can block these threats before reaching their inbox. The best way to safeguard the malicious links that install malware, which potentially access their private information, is to have an antivirus software installed on all its devices. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Get my elections for the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.
7. Use the authentication of two factors and a password administrator: If a scam compromises its login credentials, Two factors authentication (2FA) You can block unauthorized access. A password administrator also helps protect against reused or weak passwords. Get more details about me The best password administrators reviewed by experts from 2025 here.
8. Report the scam immediately: Wear Facebook reports tools To mark profiles or false messages. You can also file a complaint with the FTC in Reportfraud.ftc.gov to help warn others.
The best security cameras to monitor and identify the vandalism of cars
Kurt’s Key Takeways
The scammers are using Musk’s name to execute scams of false awards, investment traps and Facebook impersonation schemes. In one case, a reader lost $ 800 after he was promised a Tesla and $ 250,000 in cash, but only if they first sent Apple’s gift cards. These scams depend on the trust, speed and recognition of celebrities. The true musk is not sending private messages to strangers. If someone contacts him with an award and asks for money or gift cards, it is a scam. Inform it, block the account and help others stay alert.
Have you ever been contacted by someone who intends to be Elon Musk? Get us knowing in Cyberguy.com/contact.
Click here to get the Fox News application
To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter
Ask Kurt a question or let us know what stories we would like to cover
Follow Kurt in his social channels
Answers to Cyberguys most facts:
New Kurt:
Copyright 2025 Cyberguy.com. All rights reserved.
Reference: Read Latest News in Spanish