Amazon Warns 200M Prime Customers About Login Info Scams

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 3 min read

Amazon Scam Targeting Prime Members

Amazon on phone next to Prime box
Image courtesy of Tom's Guide

Scammers are impersonating Amazon through fake emails, targeting the over 200 million Amazon Prime customers. These emails inform recipients that their Prime subscription will automatically renew at a higher price. This creates urgency, prompting users to engage with the fraudulent message. As reported by Malwarebytes, the emails often contain personal information to enhance their credibility, making them difficult to identify as scams.

Phishing for Login Information

A fishing hook resting on a laptop keyboard.
Image courtesy of Tom's Guide

The fraudulent emails utilize the Amazon logo and style, and they often include a “cancel subscription” button. Clicking this button leads to a fake login screen where users are prompted to enter their credentials. Once entered, these details can be exploited for malicious activities, including unauthorized purchases. The risk escalates if users reuse passwords across different platforms, as this can lead to widespread account compromises. For more information on how to protect against such attacks, refer to Tom's Guide.

Safeguarding Against Scams

Woman using smartphone and laptop
Image courtesy of Tom's Guide

To secure your Amazon account, users should be vigilant when checking emails. Here are recommended practices:

  • Verify the sender’s email address. Legitimate emails will originate from recognized domains like amazon.com.
  • Check your account directly via the Amazon app or website rather than through email links. This ensures you are accessing the official platform.
  • Report any suspicious emails to Amazon via their reporting page.
  • Consider implementing two-step verification for added security.

By maintaining these practices, users can help mitigate the risks posed by phishing attacks.

Co-op Cyberattack and Data Exposure

A hacker typing quickly on a keyboard
Image courtesy of Tom's Guide

A cyberattack on the Co-operative Group has compromised the personal data of 6.5 million members, as confirmed by CEO Shirine Khoury-Haq. The breach involved the copying of member details such as names, addresses, and contact information, but financial data remained secure due to rapid detection and response measures. The attack was attributed to the Scattered Spider group, known for employing deceptive tactics to gain access to corporate networks.

Mitigating Personal Data Risks

A woman's hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.
Image courtesy of Tom's Guide

Individuals affected by the Co-op data breach should remain vigilant for phishing attempts leveraging the stolen information. The Information Commissioner’s Office encourages those concerned to seek guidance on protecting personal data. Here are essential steps to remain secure:

  • Be cautious of unexpected links or attachments in emails.
  • Regularly monitor bank statements for unauthorized transactions.
  • Install robust antivirus software to detect and block malware.

To fortify your organization's defenses against similar incidents, consider Gopher Security's AI-powered Zero Trust platform, which utilizes peer-to-peer encrypted tunnels and quantum-resistant cryptography to secure networks and devices.

Conclusion and Further Steps

As the frequency of cyberattacks rises, staying informed and proactive is crucial. If you are part of an organization that requires robust cybersecurity measures, explore Gopher Security's offerings at Gopher Security, which specializes in comprehensive security solutions tailored for today's digital threats.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article