Cyber Security News

New Phishing Attack Targets Amazon Prime Users to Steal Login Credentials

A new phishing campaign targeting Amazon Prime users has been identified, aiming to steal login credentials and other sensitive information, including payment details and personal verification data.

The attack, analyzed by the Cofense Phishing Defense Center (PDC), uses a carefully crafted email impersonating official Amazon communications to deceive recipients.

Sophisticated Email Spoofing Campaign Exploits Amazon Branding

The phishing emails appear to notify users of an expired or invalid payment method, urging them to update their information.

The sender’s address is spoofed to resemble a legitimate Amazon notification, while the email body mimics authentic branding with the Amazon logo, corporate footer, and familiar language.

Email Body

The subject line creates a sense of urgency, compelling recipients to act quickly. However, closer inspection reveals that the sender’s domain is unrelated to Amazon, a key red flag.

When users click on the provided link, they are redirected to a fraudulent webpage that imitates Amazon’s security verification process.

Instead of leading to Amazon’s official site, the URL redirects users to platforms like Google Docs or other suspicious domains.

This fake security notice is designed to lower suspicion and encourage victims to proceed further.

Fake Amazon Security Alert

Phishing Scheme Seeks Payment and Personal Data for Fraudulent Use

Once on the phishing site, users are prompted to enter their Amazon login credentials on a counterfeit login page.

Following this step, they are directed to additional pages requesting personal information such as their mother’s maiden name, date of birth, phone number, billing address, and even credit card details.

Personal Information Phishing Page

According to Cofense Report, these details are commonly used in identity verification processes and can be exploited for unauthorized access or financial fraud.

The phishing scheme also seeks payment card information, including cardholder name, card number, expiration date, and CVV code.

If compromised, these details could enable attackers to conduct unauthorized transactions or sell the data on the dark web.

What sets this campaign apart is its multi-layered approach: it not only harvests login credentials but also requests supplementary data that could aid attackers in bypassing additional security measures.

The fraudulent pages often contain minor grammatical errors, another indicator of their illegitimacy.

To protect against such attacks, users are advised to verify the sender’s email address and avoid clicking on links within unsolicited emails.

Instead, they should log in directly through Amazon’s official website or app.

Enabling multi-factor authentication (MFA) adds another layer of security against credential theft.

Credential Update Page

The rise in phishing attacks targeting popular platforms like Amazon underscores the importance of vigilance in online interactions.

Users should remain cautious when handling sensitive information and report suspicious emails or websites directly to Amazon.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s o1/o3,…

2 minutes ago

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition…

3 minutes ago

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows policy…

1 hour ago

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake projects…

1 hour ago

Poseidon Stealer Targets Mac Users via Fake DeepSeek Website

Cybersecurity researchers uncovered a sophisticated malware campaign targeting macOS users through a fraudulent DeepSeek.ai interface.…

1 hour ago

Beware of Fake Job Interview Challenges Targeting Developers to Deliver Malware

A new wave of cyberattacks, dubbed "DeceptiveDevelopment," has been targeting freelance developers through fake job…

3 hours ago