We will use your email address only for sending you newsletters. Please see our Privacy Notice for details of your data protection rights.
Amazon Prime Day 2020 is fast approaching, with the exclusive savings for Prime members going live next week. Amazon Prime Day 2020 is running on Tuesday, October 13 and Wednesday, October 14, with “incredible savings and deep discounts” on offer. The online shopping giant said there will be over one million deals offered globally during Amazon Prime Day 2020.
But ahead of the busy sale period next week Amazon customers have been put on alert about a convincing-looking scam which is being circulated.
Action Fraud UK said in the space of just 24 hours they received over 270 reports of a new scam targeting Amazon customers.
The scam begins with an Amazon customer receiving an official-looking e-mail which allegedly alerts the recipient to an “account issue”.
The e-mail claims the recipient has to “verify” their Amazon account to resolve the problem and directs them to a legitimate-looking website.
However, it is all part of a new phishing scam designed to steal Amazon login details as well as sensitive personal and financial information.
Alerting Amazon customers to the threat, Action Fraud UK posted on Twitter: “SCAM WARNING: Watch out for these fake Amazon emails, we received over 270 reports in just one day. If you receive a suspicious email, you can report it by forwarding the email to – firstname.lastname@example.org #PhishyFridays”.
While the UK’s national fraud and cyber reporting centre went on to say: “Action Fraud has received over 270 reports in 24 hours about fake emails purporting to be from Amazon.
“The emails state that there is an ‘account issue’ and ask the recipients to ‘verify’ their Amazon account. The links provided in the email leads to genuine-looking phishing websites that are designed to steal Amazon login credentials, as well as personal and financial information.”
The offending e-mails feature Amazon branding as well as a similar font and layout that the online shopping giant uses in their official messages to make it look like the real deal.
While the fake website the e-mail directs users to also is designed in the same way as a legitimate Amazon webpage. However, the giveaway that the website is a fake is the URL which isn’t an Amazon address.
Action Fraud UK adds: “Your bank, or any other official organisation, won’t ask you to share personal information over email or text. If you need to check that it’s a genuine message, call them directly.”
The cyber fraud experts also said: “Spotted a suspicious email? Forward it to the Suspicious Email Reporting Service (SERS) – Report@phishing.gov.uk”.
Speaking to Express.co.uk about the latest scam threat, an Amazon spokesperson said: “We take phishing attempts on our customers seriously, and will never call a customer for payment outside of our website. If a customer has concerns or receives a call they believe is not from Amazon, they can check the Amazon.co.uk help pages for guidance.”
The online shopping giant offers detailed advice on their website which explains how Amazon customers can spot an official e-mail from the retailer.
Amazon UK gives the following advice…
• Amazon e-mails will always come from an address that ends @amazon.co.uk (e.g. email@example.com, firstname.lastname@example.org, email@example.com)
• Links to legitimate Amazon websites start with https://www.amazon.co.uk or the equivalent if you’re visiting an international Amazon site (e.g. https://www.amazon.fr if viewing the French site). Legitimate Amazon websites also have a dot before “amazon.co.uk” such as https://www.”something”.amazon.co.uk or “something”.amazon.co.uk. For example, Amazon Pay is pay.amazon.co.uk. The wording before the dot will never be IP address (string of numbers), such as http://123.456.789.123/amazon.co.uk/
• Amazon will never ask for personal information to be supplied by e-mail
• Amazon will never request to update payment information that is not linked to an Amazon order you placed or an Amazon service you subscribed to
Source: Read Full Article