Lately, I have received more phishing emails in my burner (test) email that are related to Amazon than ever before. This probably due to the influx of online shopping driven by COVID-19. Attackers are smart, they know that people are shopping online for essentials rather than going to the store in person. During this post I will take you through one of the most recent emails I have received, explain some of the key markers that can be used to identify this as a phishing email, and demonstrate what would happen if someone clicked the phishing link.
The following screenshot is the most recent Amazon email received:
Let’s take a look at some of the clear giveaways in this email:
I don’t know about you but, to me, this doesn’t appear to be one of Amazon’s legitimate customer service email addresses….
As shown in the image above, this link above does appear to be an amazon email. However, it’s included in the recipients list, not the sender. The attacker likely added a real Amazon email address into the recipients list to make the email appear more convincing. Everyone who received the email was “BCC” – blind carbon copied.
Right click the “Update Your Payment” button – Select “copy link address”. Paste this into a text editor to view the URL. This definitely doesn’t appear to be an Amazon address.
Let’s take a look at what would be presented to a victim who has clicked the phishing link. (DISCLAIMER – Do NOT click on links or respond to emails you are unfamiliar with.)
Step 1. Click the embedded link. It appears it has brought us out to a fake Amazon login portal (see screenshot below). Entering fake information for the email, I proceed to click the ‘Continue’ button and enter a fake password.
Step 2. As shown in the screenshot below, the website now wants billing address information – name, address, phone number, date of birth, and even your social security number! After providing the attacker with more fake information we proceed to click the “Update” button.
Step 3. The last information the website is requesting from the user is credit card information (see screenshot below). Entering fake information again and proceeding to click the “Update” button.
If you pay close attention, you will notice that none of the URLs in the screenshots above are for legitimate Amazon resources.