Hackers are targeting the Amazon Prime account.
AFP via Getty Images
Update, January 29, 2025: This story, first released on January 28, has updated detailed information on Amazon Prime Hacking and other PDF -related malware threats.
It was only a few weeks since the Amazon AWS cloud service user was warned of ransomware attacks with unacceptable labeling. It was only a few days since the scams that were expected to be purchased from Amazon to buy iPhone 16. Currently, security researchers have warned Amazon Prime users that new hacking campaigns are targeting not only confidential account data but also credit card details. This is what you need to know.
Your AmazonPrime has not expired, but your security may be about
Palo Alto’s UNIT 42 Research Division threats intelligence analysts have confirmed a new hacking campaign for Amazon users using Amazon Prime MemberShip Expire Lure. In the X post on January 27, UNIT 42 uses a PDF document that leads to the attacker to enter an attacker in the threat campaign to enter the user’s confidential account data and credit card information. I warned that I was doing it. The unit 42 Amazon Prime Warning is scary when it gets hot just after another warning regarding the use of a PDF document with a hack attack for smartphone users. Each of the 31 PDF documents used by the Amazon Prime hacker uses a complex redirection process, including the entire bunch of various URLs, before reaching the site that steals the data. It has been reported that threat actors have registered more than 1,000 malicious domains. All of these have been designed to be associated with Amazon itself since June 2024.
“The first attack vector that users are fascinated to open an electronic mail attached to the PDF file,” said Javvad Malik, a security consciousness of KnowBe4, “The importance of being alert to the e -mail. It is reminiscent. “
“This campaign shows the difficult evolution of phishing tactics, especially when utilizing reliable brands like Amazon to utilize users,” said Dray AGHA, a senior manager of Huntress security. We have added that it emphasizes the important needs of the strategy strategy with the user. Education and robust endpoints. “Use of PDFs with redirect techniques to make defense difficult to read” indicates how enemies adapt to security solutions and bypass.
Amazon users are not only targeted for PDF -based malware
The use of PDF seems to be a continuous discussion needed to consider new reports from Zimperium security experts. I ignore the shameful fact that a report called Missing “Missing” is straight to adult content. Zimperium’s ZLABS threat research team reveals what is called an unprecedented obfine method used to steal qualifications and compromise confidential data. did. Smartphone users often have a lot of visibility on the content of the file before opening the file, so do not do it, researchers have a significant risk of data infringement, qualification theft, and workflow confusion. He said that it would increase. NICO CHIARAVIGLIO, ZLABS’s ZLABS Chief Scientist, states that the latest campaign emphasizes the need for aggressive mobile security measures.
Relax the latest Amazon Prime Hack attack campaign
Currently, the current advice on relieving this attack, including a PDF documentation, is not to open what you did not expect. Regardless of who they came from. Use the official channel to verify the belief, etc., and use the official channel to contact the sender or at least who will be the sender.
“The aggressive steps of Amazon, including the implementation of a large number of fishing websites and implementing advanced email verification technology, deserve praise,” said Malik. Malicious sites continue to be born. “
I approached Amazon for a statement, and Amazon’s spokeswoman stated: We continue to invest in consumer protection and general people’s education on fraud. Consumers recommend to protect your account and report bad stakeholders to the law execution agency to keep consumers safer. Access a help page, find additional information on how to identify fraud, and report them on Amazon.com/Reportascam. “
The Amazon Support Page suggests that users will consider the following for these brand spoofing. Such an attacker often tries to create an emergency to persuade you to do what they are asking, and they send the notifications you did not expect.