{"id":15774,"date":"2019-07-12T10:45:15","date_gmt":"2019-07-12T18:45:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/12\/news-9521\/"},"modified":"2019-07-12T10:45:15","modified_gmt":"2019-07-12T18:45:15","slug":"news-9521","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/12\/news-9521\/","title":{"rendered":"An Amazon Phishing Scam Hits Just in Time For Prime Day"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d27b9ba1da7e10008d6a991\/master\/pass\/Amazon-Phishing-153339871-157171052.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 12 Jul 2019 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">Next week, Amazon <\/span>will celebrate <a href=\"https:\/\/www.wired.com\/tag\/amazon-prime-day\/\">Prime Day<\/a>, a bacchanal of modestly discounted ephemera. But amid the flurry of cheap TVs and ebooks and what else, maybe Instant Pots? Watch out for this <a href=\"https:\/\/www.wired.com\/2017\/03\/phishing-scams-fool-even-tech-nerds-heres-avoid\/\">clever phishing campaign<\/a> that might hit your inbox.<\/p>\n<p>Researchers from security company McAfee today have shared details of a so-called phishing kit, which contains the tools an aspiring hacker would need to kick off a phishing campaign, designed to target Amazon customers. While McAfee discovered this particular kit in May, it appears to be a spinoff of one that had targeted Apple users in the US and Japan last November. The kit is called 16Shop; its author goes by the handle DevilScreaM.<\/p>\n<p class=\"paywall\">In both the Apple and Amazon campaigns, 16Shop makes it easy for anyone to craft an email that looks like it comes from a major tech company, with a PDF attached. That PDF contains links to malicious sites that have been gussied up to look like, in this most recent case, an Amazon log-in page. Anyone who falls for it will have given up the keys to their Amazon account, and any other service for which they reuse that same password. As with the previous Apple campaign, those links direct victims to a page that requests not just their name but also their birthday, home address, credit card info, and Social Security number.<\/p>\n<p class=\"paywall\">\u201cThe use of major brands looks to leverage the subconscious lever of authority to invoke user interaction,\u201d says McAfee chief scientist Raj Samani.<\/p>\n<p class=\"paywall\">All of this is typical of a phishing campaign, and in fact less sophisticated than the more targeted spearphishing attacks that regularly strike high-value targets. Its significance, though, lies in the timing. With Prime Day fast approaching\u2014bringing with it a barrage of legitimate deals emails from Amazon\u2014the sharks are circling.<\/p>\n<p class=\"paywall\">\u201cCybercriminals take advantage of popular, highly visible events when consumers are expecting an increased frequency of emails, when their malicious emails can hide more easily in the clutter,\u201d says Crane Hassold, threat intelligence manager at the digital fraud defense firm Agari. \u201cConsumers are also more conditioned to receiving marketing or advertisement emails during certain times of the year\u2014Black Friday, Christmas, Memorial Day\u2014and cybercriminals format their attack lures accordingly to increase the chances of success.\u201d<\/p>\n<p class=\"paywall\">At the very least, interest around the Amazon phishing kit appears high. McAfee says that DevilScreaM set up a Facebook group to sell licenses and provide product support\u2014like any good software startup\u2014nearly two years ago. By November 2018, the group had 200 members. As of last month, it had topped 300 members and 200 posts. And McAfee has identified over 200 malicious URLs\u2014that start deceptively with verification-amazonaccess, verification-amaz0n, and so on\u2014associated with the phishing kit. It\u2019s unclear how many people have actually fallen for the ruse, but fair to say that business is bustling.<\/p>\n<p class=\"paywall\">McAfee notified Facebook that the 16Shop group exists, but as of Thursday night the social network had not yet taken it down. Facebook did not return a request for comment.<\/p>\n<p class=\"paywall\">The good news is, the Amazon scam spree doesn\u2019t appear uniquely clever, which means the <a href=\"https:\/\/www.wired.com\/story\/resist-phishing-attacks\/\">usual rules for protecting yourself<\/a> apply. Make sure that email comes from who it claims; in Gmail you can double check by clicking on the downward arrow next to your name. Don\u2019t open attachments unless you\u2019re sure it\u2019s from someone you trust. Similarly, don\u2019t type your information into a website that\u2019s not legit, which means taking a close look at that URL. (The green lock in the URL bar, sadly, just means your data is encrypted in transit, not that it\u2019s headed somewhere safe.) Get a <a href=\"https:\/\/www.wired.com\/story\/best-password-managers\/\">password manager<\/a>, to limit the fallout if you do accidentally cough up your log-in details. And don\u2019t trust a deal that seems too good to be true\u2014even on Prime Day.<\/p>\n<p class=\"related-cne-video-component__dek\">Phishing scams are getting more and more sophisticated, to the point where they\u2019re fooling even security experts. Here&#39;s how to avoid them.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/amazon-prime-day-phishing-campaign\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d27b9ba1da7e10008d6a991\/master\/pass\/Amazon-Phishing-153339871-157171052.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 12 Jul 2019 13:00:00 +0000<\/strong><\/p>\n<p>Some deals are too good to be true, even on the most made-up holiday of all.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15774","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15774"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15774\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15774"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}