Blog
It’s ‘Ez-Peasy’ for Scammers: E-ZPass Tops Q2 2025’s Most Imitated Brands in Phishing Scams

It’s ‘Ez-Peasy’ for Scammers: E-ZPass Tops Q2 2025’s Most Imitated Brands in Phishing Scams

Reviewed by
In Q2 2025, E-ZPass leads the list of most-phished brands as scammers use AI to craft urgent, trusted messages. See which brands made the top 10 and how the tactics are evolving.
Table of Contents
In Q2 2025, E-ZPass leads the list of most-phished brands as scammers use AI to craft urgent, trusted messages. See which brands made the top 10 and how the tactics are evolving.

Key Takeaways

Scammers are ramping up impersonation tactics using the brands people trust the most.

In Q2 2025, phishing scams continued to grow in scale and creativity. From fake toll violations to cleverly disguised login alerts, scammers are constantly adapting, and AI is now accelerating how quickly and convincingly they can do it.

What’s changed this quarter? The most impersonated brand isn’t a tech giant. It’s E-ZPass, a regional toll service.

This signals a shift in how cybercriminals are operating. They’re leaning into urgency and routine, using familiar-looking messages to pressure people into quick action, now generated and scaled more efficiently thanks to AI. At the same time, big names like Microsoft, Steam, and Facebook remain top targets, especially in credential theft and account takeovers.

Let’s take a look at the most-imitated brands this quarter and the latest phishing tactics making the rounds.

{{component-cta-custom}}

The Top 10 Most-Impersonated Brands in Q2 2025

  1. E-ZPass

  2. Microsoft

  3. Steam

  4. Facebook

  5. Roblox

  6. Coinbase

  7. Netflix

  8. American Express

  9. Telegram

  10. Australian Government

New entries this quarter include Coinbase, American Express, Telegram, and the Australian Government.

Why These Brands Are Being Targeted

This quarter’s top three impersonated brands, E-ZPass, Microsoft, and Steam, reflect a growing trend in scam design. Scammers are combining urgency, emotional pressure, and trust to get people to act without thinking.

  • E-ZPass: Phishing scams impersonating E-ZPass typically claim the recipient missed a toll payment or owes a fine. These messages often include state-specific branding and URLs that closely resemble real toll agency websites. With the help of AI, scammers are able to generate localized versions of these messages across different U.S. states, making them feel official and relevant to each recipient.

    Because toll payments are common and often automated, recipients are likely to believe the notice is legitimate and act quickly to avoid penalties. The simplicity and routine nature of the message, paired with a sense of urgency, make this scam especially effective.
  • Microsoft: Microsoft remains one of the most impersonated brands globally, especially in credential theft campaigns. Scammers send emails that look like legitimate security alerts, such as login attempts from unknown devices or password reset prompts. These emails often mimic Microsoft’s branding with precision.

    Once a user clicks the link and enters their credentials, attackers can gain access to Outlook, OneDrive, Teams, and even enterprise accounts, unlocking a wide range of personal and professional data. Given how deeply integrated Microsoft accounts are into people’s daily lives, they’re a high-value target.
  • Steam: Popular with younger users, Steam has become a frequent target for phishing scams that play on urgency and excitement. Attackers often pose as bots, friends, or giveaway accounts, offering free games, discount codes, or trade offers that require immediate action. These messages feel casual and legitimate, especially when they come through gaming forums or chat apps like Discord.

    Victims are directed to fake login pages that closely mimic Steam’s interface. Once credentials are entered, scammers can steal access to game libraries, virtual assets, and even linked payment methods. The emotional nature of these scams—whether it’s fear of missing out or reacting quickly to a “support issue”—makes them highly effective.
  • Facebook: Still one of the most impersonated platforms, Facebook is commonly spoofed in phishing attacks that claim an account has been reported, locked, or flagged for suspicious activity. These messages often include links to fake “appeal” or “recovery” pages, prompting users to log in.

    Once credentials are captured, scammers can take over the account and use it to message friends, join groups, or post misleading content. Many scams continue through Messenger or Facebook Marketplace, where trust plays a key role. Because Facebook is deeply personal for many users, fear of losing access leads people to act fast, exactly what attackers rely on.

Scam Trends on the Rise in Q2

DMV and Toll Fee Scams

Toll and DMV scams exploded this quarter. Guardio tracked a 773% increase in scam texts impersonating toll services across the U.S., with nearly every state being individually targeted. Scammers used AI to quickly generate localized versions of these messages, adjusting names, links, and language to match each state’s official toll agency or DMV.

These scams feel routine and plausible. If you’ve ever driven through a toll and weren’t sure if you were charged, the message hits just the right nerve. Victims are urged to pay immediately, and the links lead to phishing sites designed to look nearly identical to real government portals.

Even the FBI issued a public warning, advising people to delete these messages on sight. The sophistication of the fake websites and the hyper-local personalization make this one of the most convincing phishing formats seen this year.

Phishing scam via fake DMV text and spoofed Illinois DOT site demanding toll payment, showing SMS and fraudulent website on mobile.

Tariff Relief Scams

Another trend is the rise of tariff or government subsidy scams. These messages promise financial relief or rebates in exchange for a “processing fee.” Often disguised as official notices, these scams take advantage of economic uncertainty. They aim to create just enough hope and urgency to get people to enter payment details or personal information.

Guardio identified dozens of phishing domains mimicking government and financial assistance programs tied to trade or tariff-related aid.

The 16 Billion Password Leak

A massive leak uncovered this quarter included over 16 billion stolen credentials. The source? Not one big new breach, but rather an accumulation of data from infostealer malware and years of credential theft.

This isn’t about one company being hacked. It’s about malware that silently collects your login info, passwords, and other personal data while you browse. Once stolen, this data gets shared, sold, and reused across the cybercrime world.

Even if you weren’t directly affected, this is a good reminder to take action. If your passwords haven’t changed in a while, they may already be floating around underground. Reusing passwords across accounts only makes things worse.

What You Can Do

Phishing scams are evolving fast, but staying ahead is possible. Here’s what security experts recommend:

  • Be cautious with urgent messages. Don’t click links in texts or emails without verifying the sender.

  • Check the source. When in doubt, visit the official site directly instead of using links from messages.

  • Use strong, unique passwords. Consider a password manager to make this easier.

  • Turn on multi-factor authentication. This adds an extra layer of security even if your password gets stolen.

Install a protective tool like Guardio. It can help detect phishing attempts, block malicious websites, and keep your personal info safe.

Final Thoughts

Phishing is no longer limited to sketchy emails. It now includes convincing texts, realistic websites, and scams that feel like everyday tasks. Whether it's a toll fee reminder, a fake Steam code, or a security alert from Microsoft, scammers are getting better at pretending to be the brands you trust.

The good news? You can stay ahead by staying alert. Recognize the signs, protect your accounts, and take action when something feels off.

If you're curious whether your info was exposed in recent breaches or want to learn more about phishing trends, Guardio can help.

Stay safe out there.

Top 10 most impersonated brands in phishing scams for Q2 2025, led by E-ZPass, Microsoft, Steam, and new entries like Coinbase and Netflix.

{{component-cta-custom}}

CMS-based CTA:
Smart protection, built for how you live online
Stay ahead of threats with real-time insights and proactive protection.
Add Guardio to BrowserTake Security Quiz
Default CTA:
Smart protection, built for how you live online
Stay ahead of threats with real-time insights and proactive protection.
Add Guardio to BrowserTake Security Quiz
CMS-based "Did you know?" block
Did you know?
Default "Did you know?" block
Did you know?

Make sure you have a personal safety plan in place. If you believe someone is stalking you online and may be putting you at risk of harm, don’t remove suspicious apps or confront the stalker without a plan. The Coalition Against Stalkerware provides a list of resources for anyone dealing with online stalking, monitoring, and harassment.

Guardio Security Team
Guardio’s Security Team researches and exposes cyber threats, keeping millions of users safe online. Their findings have been featured by Fox News, The Washington Post, Bleeping Computer, and The Hacker News, making the web safer — one threat at a time.
Tips from the expert

Related articles

FAQs

No items found.
Table of Contents
Can You Spot a Scam Text Message?
Test your skills and learn how to protect yourself from online scams.
Take the quiz now
Can You Spot a Scam Text Message?
Test your skills and learn how to protect yourself from online scams.
Take the quiz now