Amazon Warns 200M Prime Customers About Login Info Scams

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 3 min read

Amazon Scam Targeting Prime Members

Amazon on phone next to Prime box

Image courtesy of Tom's Guide

Scammers are impersonating Amazon through fake emails, targeting the over 200 million Amazon Prime customers. These emails inform recipients that their Prime subscription will automatically renew at a higher price. This creates urgency, prompting users to engage with the fraudulent message. As reported by Malwarebytes, the emails often contain personal information to enhance their credibility, making them difficult to identify as scams.

Phishing for Login Information

A fishing hook resting on a laptop keyboard.

Image courtesy of Tom's Guide

The fraudulent emails utilize the Amazon logo and style, and they often include a “cancel subscription” button. Clicking this button leads to a fake login screen where users are prompted to enter their credentials. Once entered, these details can be exploited for malicious activities, including unauthorized purchases. The risk escalates if users reuse passwords across different platforms, as this can lead to widespread account compromises. For more information on how to protect against such attacks, refer to Tom's Guide.

Safeguarding Against Scams

Woman using smartphone and laptop

Image courtesy of Tom's Guide

To secure your Amazon account, users should be vigilant when checking emails. Here are recommended practices:

  • Verify the sender’s email address. Legitimate emails will originate from recognized domains like amazon.com.
  • Check your account directly via the Amazon app or website rather than through email links. This ensures you are accessing the official platform.
  • Report any suspicious emails to Amazon via their reporting page.
  • Consider implementing two-step verification for added security.

By maintaining these practices, users can help mitigate the risks posed by phishing attacks.

Co-op Cyberattack and Data Exposure

A hacker typing quickly on a keyboard

Image courtesy of Tom's Guide

A cyberattack on the Co-operative Group has compromised the personal data of 6.5 million members, as confirmed by CEO Shirine Khoury-Haq. The breach involved the copying of member details such as names, addresses, and contact information, but financial data remained secure due to rapid detection and response measures. The attack was attributed to the Scattered Spider group, known for employing deceptive tactics to gain access to corporate networks.

Mitigating Personal Data Risks

A woman's hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.

Image courtesy of Tom's Guide

Individuals affected by the Co-op data breach should remain vigilant for phishing attempts leveraging the stolen information. The Information Commissioner’s Office encourages those concerned to seek guidance on protecting personal data. Here are essential steps to remain secure:

  • Be cautious of unexpected links or attachments in emails.
  • Regularly monitor bank statements for unauthorized transactions.
  • Install robust antivirus software to detect and block malware.

To fortify your organization's defenses against similar incidents, consider Gopher Security's AI-powered Zero Trust platform, which utilizes peer-to-peer encrypted tunnels and quantum-resistant cryptography to secure networks and devices.

Conclusion and Further Steps

As the frequency of cyberattacks rises, staying informed and proactive is crucial. If you are part of an organization that requires robust cybersecurity measures, explore Gopher Security's offerings at Gopher Security, which specializes in comprehensive security solutions tailored for today's digital threats.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article