Amazon Phishing Emails

Look-out for fake Amazon order notification emails that ask you to call “fraud prevention support” if you didn’t authorise the supposed payment. The emails, which feature seemingly authentic Amazon branding, list supposed purchases for high priced items such as smart TVs and game consoles. The total cost of the listed purchases is usually several thousand dollars.

These emails are not from Amazon and they do not contain details of any real purchases made via your Amazon account. Even if you’ve never logged on to Amazon some of these scams can affect you, too. 

The goal of the scam emails is to panic you into calling the supposed fraud prevention number. The scammers hope that you will call in the mistaken belief that your account has been compromised and that high-value items have been purchased using your credit card. If you do call, you will be connected to a scammer posing as an Amazon fraud prevention support worker.  After you explain the situation, the scammer will claim that the purchase can be reversed and the supposed account breach rectified.

Then, the scammer will claim that to proceed with the reversal, he or she will need you to provide your credit card details, your Amazon login credentials, your name and address, and other sensitive personal information. After you provide the requested information, the scammer will assure you that the transaction has been reversed and that the funds will be put back into your account within a specified time-frame such as 24 hours.

You might relax, believing that you have dealt with the issue. But, now, the scammers can use the information stolen from you to hijack your Amazon account and make fraudulent purchases in your name, fraudulently use your credit card, and, possibly, steal your identity as well.

If you receive an email that claims to be from Amazon and lists purchases you know nothing about, be sure to proceed with caution. Do not call any number listed in the email. Do not click any links or open any attachments that the email contains.
Instead, log in to your Amazon account via your browser or a trusted app and check for any unauthorised purchases. Also, check your bank or credit card provider.  If the email is a scam, there will be no unexpected transactions listed in your accounts.

These are sophisticated frauds thar share some  characteristics with the fake Tech Support scams that have generated over £2m for criminals un the UK last year, according to Action Fraud.

If there are such transactions, you can then contact your credit card provider and Amazon for assistance. These scams work because the emails may appear genuine at first glance and they are designed to get people to act quickly without due forethought.

Amazon takes phishing and spoofing attempts seriously. If you receive correspondence you think may not be from Amazon, please report it to Amazon.

Amazon:       Kaspersky:       Hoax Slayer:     Hertforshire Mercury:      Action Fraud:

You Might Also Read:

Popular Types Of Phishing Emails:

 

« Pro-Active Cyber Protection
Bug Bounty & Crowd-Sourced Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.