Actors Engage in Social Engineering-Based Email and Voice Phishing Targeting Amazon Users

  • Amazon users are falling to the trap of clever fraudsters who are sending phishing emails that pass through security filters.
  • The actors are compromising the accounts of vendors to send messages to people who have submitted orders.
  • In other cases, they sent emails containing a number to a fake “fraud protection” line that steals sensitive user details.

Armoblox has recorded a new wave of phishing attempts that take place against Amazon clients, involving both emails and voice messages (“vishing”). The new methods deployed by the threat actors manage to bypass email security controls because they do not follow standard practices, and are generally pretty tricky for the recipients.

In many cases, a compromise on the vendor’s account and a full takeover creates the setting for effective social engineering attacks, so here’s how it’s done.

amazon-phishing-attack-flow
Source: Armoblox

The attacker takes over the vendor’s account on Amazon, and then sends credential phishing email messages to people who have placed recent orders to that merchant. The message informs the recipient that their order cannot be shipped due to a payment processing failure, and so they are asked to update their details.

Clicking on the link takes the victim to a phishing webpage (sttppcappr.com), where they are urged to fill out a form. Once they do, they are redirected to the real Amazon website to dissipate any suspicions. The phishing page is very nicely-designed, easily convincing the careless visitor.

amazon-details-cc-final
Source: Armoblox

The voice phishing technique follows a different approach. Instead of taking over vendor accounts, the actors are creating Gmail accounts that impersonate Amazon (no-reply Amazon), and send carefully crafted messages to inform recipients that their order has been shipped.

The email claims that the recipient has placed a $6,000 order and urges the alarmed victim to call a “Fraud Protection” line using the number provided at the bottom of the message.

amazon-vishing-email-final
Source: Armoblox

If the target does call, a fraudster who impersonates a member of Amazon’s team will answer the call, convincing the victim that all that is happening is legit. The fraudster proceeds to ask for the order number, the caller’s name, and even their credit card details, supposedly to confirm that they’re handling a valid request. Once the victim gives away this information, the scammer ends the call and blocks the number.

The absence of links in the emails helps these messages to easily pass through security filters and reach more potential victims. Moreover, the fact that the sender hasn’t sent an email to the target address before helps them avoid any unexpected blocks along the way.

All in all, these attempts are based on the diligent design that is required for brand impersonation – Amazon, in this case – and a whole lot of social engineering. When receiving email messages, stay vigilant, stay calm, look closely, and identify fraud signs.

Read More:

REVIEW OVERVIEW

Recent Articles

Apple Launched AirPods Pro Service Program for Problematic Products

Apple is offering to fix or replace AirPod Pros that have sound problems or defective noise cancellation.There have been several reports about...

E-Commerce Firm ‘Lazada’ Breached by Hackers and User Data Accessed

Alibaba’s ‘Lazada’ subsidiary has had a data breach incident through its grocery handle, RedMart.The incident affected 1.1 million customers from Singapore, who...

UK ICO Imposes £16.95 Million Penalty to Marriott for Data Breach Incident

Britain’s data watchdog has discounted the Marriott fine down to about one-fifth of the original.The officer justified the decision by mentioning Marriott’s...