Amazon Phishing Emails

Look-out for fake Amazon order notification emails that ask you to call “fraud prevention support” if you didn’t authorise the supposed payment. The emails, which feature seemingly authentic Amazon branding, list supposed purchases for high priced items such as smart TVs and game consoles. The total cost of the listed purchases is usually several thousand dollars.

These emails are not from Amazon and they do not contain details of any real purchases made via your Amazon account. Even if you’ve never logged on to Amazon some of these scams can affect you, too. 

The goal of the scam emails is to panic you into calling the supposed fraud prevention number. The scammers hope that you will call in the mistaken belief that your account has been compromised and that high-value items have been purchased using your credit card. If you do call, you will be connected to a scammer posing as an Amazon fraud prevention support worker.  After you explain the situation, the scammer will claim that the purchase can be reversed and the supposed account breach rectified.

Then, the scammer will claim that to proceed with the reversal, he or she will need you to provide your credit card details, your Amazon login credentials, your name and address, and other sensitive personal information. After you provide the requested information, the scammer will assure you that the transaction has been reversed and that the funds will be put back into your account within a specified time-frame such as 24 hours.

You might relax, believing that you have dealt with the issue. But, now, the scammers can use the information stolen from you to hijack your Amazon account and make fraudulent purchases in your name, fraudulently use your credit card, and, possibly, steal your identity as well.

If you receive an email that claims to be from Amazon and lists purchases you know nothing about, be sure to proceed with caution. Do not call any number listed in the email. Do not click any links or open any attachments that the email contains.
Instead, log in to your Amazon account via your browser or a trusted app and check for any unauthorised purchases. Also, check your bank or credit card provider.  If the email is a scam, there will be no unexpected transactions listed in your accounts.

These are sophisticated frauds thar share some  characteristics with the fake Tech Support scams that have generated over £2m for criminals un the UK last year, according to Action Fraud.

If there are such transactions, you can then contact your credit card provider and Amazon for assistance. These scams work because the emails may appear genuine at first glance and they are designed to get people to act quickly without due forethought.

Amazon takes phishing and spoofing attempts seriously. If you receive correspondence you think may not be from Amazon, please report it to Amazon.

Amazon:       Kaspersky:       Hoax Slayer:     Hertforshire Mercury:      Action Fraud:

You Might Also Read:

Popular Types Of Phishing Emails:

 

« Pro-Active Cyber Protection
Bug Bounty & Crowd-Sourced Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.