Tuesday, February 25, 2025
HomeAmazon AWSNew Phishing Attack Targets Amazon Prime Users to Steal Login Credentials

New Phishing Attack Targets Amazon Prime Users to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

A new phishing campaign targeting Amazon Prime users has been identified, aiming to steal login credentials and other sensitive information, including payment details and personal verification data.

The attack, analyzed by the Cofense Phishing Defense Center (PDC), uses a carefully crafted email impersonating official Amazon communications to deceive recipients.

Sophisticated Email Spoofing Campaign Exploits Amazon Branding

The phishing emails appear to notify users of an expired or invalid payment method, urging them to update their information.

The sender’s address is spoofed to resemble a legitimate Amazon notification, while the email body mimics authentic branding with the Amazon logo, corporate footer, and familiar language.

Amazon Prime
Email Body

The subject line creates a sense of urgency, compelling recipients to act quickly. However, closer inspection reveals that the sender’s domain is unrelated to Amazon, a key red flag.

When users click on the provided link, they are redirected to a fraudulent webpage that imitates Amazon’s security verification process.

Instead of leading to Amazon’s official site, the URL redirects users to platforms like Google Docs or other suspicious domains.

This fake security notice is designed to lower suspicion and encourage victims to proceed further.

Fake Amazon Security Alert

Phishing Scheme Seeks Payment and Personal Data for Fraudulent Use

Once on the phishing site, users are prompted to enter their Amazon login credentials on a counterfeit login page.

Following this step, they are directed to additional pages requesting personal information such as their mother’s maiden name, date of birth, phone number, billing address, and even credit card details.

Amazon Prime
Personal Information Phishing Page

According to Cofense Report, these details are commonly used in identity verification processes and can be exploited for unauthorized access or financial fraud.

The phishing scheme also seeks payment card information, including cardholder name, card number, expiration date, and CVV code.

If compromised, these details could enable attackers to conduct unauthorized transactions or sell the data on the dark web.

What sets this campaign apart is its multi-layered approach: it not only harvests login credentials but also requests supplementary data that could aid attackers in bypassing additional security measures.

The fraudulent pages often contain minor grammatical errors, another indicator of their illegitimacy.

To protect against such attacks, users are advised to verify the sender’s email address and avoid clicking on links within unsolicited emails.

Instead, they should log in directly through Amazon’s official website or app.

Enabling multi-factor authentication (MFA) adds another layer of security against credential theft.

Credential Update Page

The rise in phishing attacks targeting popular platforms like Amazon underscores the importance of vigilance in online interactions.

Users should remain cautious when handling sensitive information and report suspicious emails or websites directly to Amazon.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Over 35,000 Websites Hacked to Inject Malicious Scripts Redirecting Users to Chinese Websites

In a widespread cyberattack, over 35,000 websites have been compromised by a malicious campaign...

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Over 35,000 Websites Hacked to Inject Malicious Scripts Redirecting Users to Chinese Websites

In a widespread cyberattack, over 35,000 websites have been compromised by a malicious campaign...

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...