Scam awareness · 2026

7 gift card scam signals you should walk away from — Africa seller's 2026 guide

Each pattern below is a scam mechanic we see in the wild every month. Read the red flags, save them somewhere, and apply the 30-second test from the bottom of this page before you complete any trade.

Scam patterns covered
7
Markets monitored
6
Common loss
Full card value
Last refreshed
May 2026

Published 2026-05-14 · Last updated 2026-05-14 · Reading time 11-13 minutes · By SellCardNow Editorial

Most platforms you'll find in Africa are honest. A small but persistent number aren't, and the unfortunate fact about gift-card scams is that the loss is usually total and unrecoverable. A gift card code, once shared, is gone — issuers like Apple and Amazon don't reverse redemptions even when the seller can prove the code was stolen.

So the only working defense is recognition. The seven patterns below are the ones our customer-protection desk flags monthly across both English- and French-speaking African markets. The phrasing rotates because scammers iterate on what works — but the underlying mechanic of each pattern doesn't change. Learn the mechanic, and a new variation is still recognizable.


The 30-second test, before any trade

Run this before you click "send" on any chat with any platform. It catches most scams immediately.

  • 1. Is the quote within the fair range? Calculate face value × 7 × local FX per USD × 0.96 to find the ceiling. If their quote is higher, walk away. (Detailed formula in the pillar guide.)
  • 2. Did you find the WhatsApp number on the platform's actual website? Open the site directly in your browser. The number should be in the footer or on a dedicated "official channels" page.
  • 3. Are they asking for anything other than the card code, your payout details, and basic KYC? If yes — bank login, PIN, password, "verification fee", "gas fee" — it's a scam.
  • 4. Did they offer to pay you before they receive the card? Strange as it sounds, this is a scam signal too — it means they're using stolen money to bait you into trusting their flow.

Now to the seven specific patterns.


Scam 1 — The quote that's too good to be true

What the scam does: They offer a rate noticeably higher than every reputable platform — sometimes 15-30% higher. You send the code; they vanish or pay you a fraction of what they promised.

The script you'll see:"We pay the highest rate in Nigeria — ₦125,000 for $100 Apple US, send the code now." Variations include "Special promotion this week only" or "We have a direct partner in the US so we cut out the middleman."

The economic reality:Reputable platforms operate within a known floor and ceiling because the underlying wholesale value of an Apple US card is bounded. No real platform can pay 110% of a card's face value — there is no economic mechanism that makes the trade profitable for them. They are paying you with someone else's money (until it stops) or simply taking the code and disappearing.

Red flag: Quote exceeds face value × 7 × local FX per USD × 0.96. Walk away.


Scam 2 — The mid-trade payment-rail switch

What the scam does:You agree on payout method (M-PESA, bank transfer, MoMo, Wave, etc.). Mid-trade — after you've sent the code or photo — they tell you the agreed rail isn't working and ask you to accept a different method. The new method is one that is harder to dispute or that requires you to share more information.

The script you'll see:"M-PESA is down for maintenance, can we send via bank transfer instead? Just give me your bank account number and IFSC." Or: "Our M-PESA has a daily limit issue, can we use USDT? Send me your wallet address."

Why it works:Switching rails mid-trade is how scammers fish for additional information (bank details, crypto wallet, KYC docs) under time pressure. Even if the trade was real, the rail switch is unusual — reputable platforms confirm the rail upfront and don't change it without restarting the trade.

Red flag: Any request to change payout method after the rate is agreed. Stop, restart from scratch on the original rail, or walk away. A real platform will pause the trade and confirm with you via a phone call before changing anything.


Scam 3 — "Send the code first, lock the rate later"

What the scam does:Reverse the normal sequence. They tell you to share the card code first, and the rate will be confirmed once they verify the card. After you send, they either claim the card was already used (it wasn't) or simply disappear.

The script you'll see:"I can't quote you a rate until I see the card — please send the code and I'll confirm." Or: "Just send a screenshot of the code, I'll verify with our buyer and then we agree on the rate."

The legitimate flow:Reputable platforms quote the rate first (from card type, region, denomination), the seller accepts, then the platform reviews the code. The platform takes the risk that the code might be invalid; the seller takes the risk that the rate might move. Never the other way around. If the buyer needs the code before the rate, they're not a real buyer.

Red flag: Anyone asking for the code, a screenshot of the code, or the scratch panel before a final rate is locked. Walk away.


Scam 4 — The fake M-PESA reversal

What the scam does:After a real or fake payout SMS, the scammer sends a second SMS claiming Safaricom "reversed" the payment due to a technical error. They ask you to send the money back, or to resend the gift card code "while we sort it out."

The script you'll see:"Hi, your M-PESA was reversed due to system error. Please refund the KSh X to this number. Safaricom is helping us fix it." The fake SMS appears to come from "MPESA" but originates from a normal phone number with a spoofed sender ID.

The technical reality: M-PESA does notsilently reverse completed transactions. If you got the receipt SMS, the money is in your account. Period. Check your balance via *334# or the Safaricom app — if the balance matches what the legitimate receipt said, the "reversal" claim is fake.

Red flag:Any "M-PESA reversal" SMS asking you to send money or resend a code. Verify the balance independently before doing anything. The same logic applies to MTN MoMo, Orange Money, Wave, and Nigerian bank transfers — completed transactions are not silently reversed.


Scam 5 — The "verification fee" / "activation fee" / "gas fee"

What the scam does:The platform agrees to a high rate. Once the card is verified, they tell you a small fee is needed to "release" your payout — KYC fee, activation fee, gas fee, withdrawal fee, anti-fraud check fee, etc. You send the fee; they ask for another fee. Repeat until you give up.

The script you'll see:"Your card is verified, KES 2,500 (or ₦5,000, or 50 GHS) for KYC verification to release your payout." Or: "Withdrawal fee is 3% — just send 3% first and we'll process the full amount."

The rule:No reputable gift-card platform charges sellers a fee to receive their own money. The platform's commission is taken out of the gross payout amount silently — what you see in the calculator is what hits your wallet. Any platform that asks for a separate fee after the trade is agreed is scamming you.

Red flag:Any prepayment request after the rate is locked. Walk away. Don't argue, don't ask for proof, don't send a smaller "test" amount. The whole flow is a scam.


Scam 6 — The WhatsApp number from somewhere that isn't the platform's website

What the scam does:Scammers create WhatsApp accounts that impersonate real platforms — often with a profile photo copied from the platform's logo and a phone number close enough to look plausible. They advertise via Facebook posts, Instagram DMs, Telegram channels, Twitter replies, search-engine ads, or — most commonly — forwarded screenshots in WhatsApp groups.

The mechanic:Once you message the impersonator, they'll mimic the platform's flow — official-looking quote, polite responses — and either run one of the other six scams above, or simply take your card and disappear.

How to verify:

  • Open the platform's website directly in your browser (type the URL, don't click a forwarded link).
  • Find the official WhatsApp number on the footer or on a dedicated channels page (for SellCardNow that's /official-whatsapp).
  • If the number you have doesn't exactly match, don't trade with it.

Red flag:WhatsApp number from a Facebook ad, an Instagram comment, a Telegram channel, or a forwarded screenshot. Don't trust forwarded contact info — always verify against the platform's own website.


Scam 7 — The lookalike platform / clone site

What the scam does: A whole-cloth fake — a website with a similar domain name (e.g. `sellcards-now.com`, `sellcardnow.io`, `sell-cardnow.com`), copied design, and slightly different branding. The site looks legitimate, has a calculator, has a contact form. But the WhatsApp number, the rates, and the team behind it are scammers.

How they get you there:

  • Search engine ads (Google, Bing) that look like the real platform — but a slightly different domain.
  • Typosquatting — you type the URL wrong and land on a clone.
  • SEO clones — fake "review" sites that link to the clone instead of the real platform.
  • Social-media impersonation — fake Twitter / Facebook page advertising the clone domain.

How to verify:

  • Memorize the platform's exact domain. For SellCardNow it's sellcardnow.com — singular, no hyphens, .com only.
  • If you click a search result, look at the URL bar before submitting any information.
  • Bookmark the real site after you've verified it once; use the bookmark thereafter.

Red flag:Any variation on the platform's domain — extra hyphens, different TLD (.io, .net, .africa, .ng), or extra words ("sellcardnow-official", "sellcardnow-support"). These are clones. The real platform doesn't operate from multiple domains.


If you've already been scammed, here's what to do

  • Stop communicating with the scammer immediately. Don't argue, don't negotiate, don't threaten. Every reply gives them another opening to extract from you.
  • Screenshot the full chat for evidence — number, profile picture, the full conversation, any payout details they shared.
  • Block the number on WhatsApp and report it as spam via the WhatsApp "Report Contact" function.
  • Report to local consumer protection. Kenya: Communications Authority. Nigeria: NCC + EFCC for financial crimes. Ghana: NCA. The reports rarely recover the loss but they help dismantle the scammer's infrastructure over time.
  • If the scammer impersonated a real platform, tell that platform. Most platforms maintain an anti-impersonation channel — message the real WhatsApp number from the real site footer and flag it. SellCardNow can be reached via the verified number on /official-whatsapp.
  • Don't try to recover the gift card via the issuer. Apple, Amazon, Steam et al. do not reverse redemptions, even with proof of fraud. The code is treated as cash. This is harsh but it's the policy across the entire industry.
  • Don't share any new KYC documents or new cards with anyone new for at least a week. Scammers often share victim lists; if you fell for one scam, you may be approached by "another platform" trying to scam you again.

How we monitor and update this list

Our customer-protection desk reads incoming chat traffic across our official WhatsApp channels and flags any new scam variant that comes in via "have you heard of this platform" messages, "I almost got scammed by" reports, and our own ops team's pattern recognition. The seven categories above account for the overwhelming majority of patterns we see; the specific scripts and platforms behind them rotate.

We refresh this list quarterly, and add new patterns immediately if a meaningful new variant appears. If you've encountered a pattern that doesn't fit one of the seven categories, tell us on WhatsApp via the verified number. We'll evaluate and add it.

For the underlying pricing math that defines what a "fair quote" even means, see the pillar guide. For the card-selection side of getting more out of your sales, see the card-selection playbook. For our general safety overview if you only have 5 minutes, see selling safely.

Sources

References cited

External documentation, regulator pages, and registry records used in this article.

Next steps

Continue reading

Internal pages that pick up where this article leaves off.