Phishing wave is underway
The Consumer Center warns that cybercriminals are currently sending fake emails on behalf of Amazon. This includes the "Your order will be suspended-unexpected login attempt" topic. This is how you identify phishing emails.
Consumer Center is currently alerting Amazon customers to several phishing emails targeted by cybercriminals against your access data. The subject lines of the emails "Your account is temporarily blocked" and "Your order will be suspended-unexpected login attempt" and similar situations occur. Your Amazon account is said to have been blocked because the retailer detected access from an unknown device. You should log in to Amazon via the link and check the events, but in reality you will only appear on fake pages and your data will be sent to cyber criminals.
Under no circumstances should you click on the link and enter data. If you have already done so, you should change your password and notify Amazon Customer Service as soon as possible. In general, we recommend that you activate two-factor authentication to reliably protect your account from unauthorized access. Compared to previous phishing attempts, these two emails used significantly fewer misspellings and even set the official Amazon logo. However, the structure of the sentence and the choice of words quickly made it clear that the text was not written by a German-speaking Amazon employee.
Below we explain how you can identify phishing emails without a doubt.
Simple signs: how to identify every phishing email
The first sign that you have received a phishing email: As part of the email, you will be asked to confirm your personal data or enter it into a website. This one Under no circumstances should you comply. In addition, criminals often use the official logo of the company they copied in emails instead of the official sender address.
If the sender is suspicious, you should read the email twice. Often, you will also find spelling errors or inconsistencies in German grammar. Attackers often don't write their own messages, but instead use known auto-generated messages or translators to translate known messages. But why go all out?
What is the role of criminals in phishing attacks?
Phishing is used on the Internet to collect real user data. It can be used to make money if email addresses, names and other information are sold for advertising purposes or passed on in crime forums. Using the data obtained, cybercriminals can also respond to future phishing attacks in a more targeted manner, and their attacks become more effective.
Did you receive a suspicious email?
Phishing checklist
-
Spelling mistakes? -
Is sensitive data required? -
Official logo? -
Unknown sender?
Attachments and links contained in malicious emails often also infiltrate your computer with malware or viruses. Also, you should not leave suspicious emails on the left side only. Forward it to the email address above and help us report future phishing attacks.
6 items
Popular scams: this is how scammers try to fool you online
Watch now
Table of Contents