{"id":39252,"date":"2021-01-22T15:05:43","date_gmt":"2021-01-22T15:05:43","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31953\/Bugs-Allowed-Hackers-To-Hijack-Kindle-Accounts-With-Malicious-Ebooks.html"},"modified":"2021-01-22T15:05:43","modified_gmt":"2021-01-22T15:05:43","slug":"bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/","title":{"rendered":"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/6009b4b94384dd009c12b3cc\/lede\/1611249197688-amazon-kindle.jpeg?image-resize-opts=Y3JvcD0xeHc6MC44NDI2eGg7MHh3LDAuMTU3NHhoJnJlc2l6ZT0xMjAwOiomcmVzaXplPTEyMDA6Kg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"24.760233918129\"><\/p>\n<p>A series of vulnerabilities in Amazon&#8217;s Kindle could have allowed hackers to take control of victims&#8217; devices by sending them a malicious ebook, <a href=\"https:\/\/medium.com\/realmodelabs\/kindledrip-from-your-kindles-email-address-to-using-your-credit-card-bb93dbfb2a08\"><span>according to new research<\/span><\/a>.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35.081967213115\"><\/p>\n<p>Yogev Bar-On, a researcher at the security firm Realmode Labs, looked last year at the security of Kindles and in particular of Amazon&#8217;s <a href=\"https:\/\/www.amazon.com\/gp\/sendtokindle\"><span>Send to Kindle<\/span><\/a> feature. This feature allows users to send ebooks or articles to their Kindle as a &#8220;read it later&#8221; app. Bar-On found that there were three different vulnerabilities, which if combined, could lead a hacker to take control of a victim&#8217;s Kindle and spend money with their credit card on the Kindle Store, as well as access any personal information stored on the device, such as full name and address.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>&#8220;The worst case scenario would be that the attackers would steal money from the victim and also steal private information about him (like name and address),&#8221; Bar-On said in an email, referring to home addresses.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>&#8220;The attacker could do anything the Kindle could do. It can use stored credentials (not a password, special credentials) to log in to the victim&#8217;s Amazon account,&#8221; Bar-On explained. &#8220;I am not sure to which extent the attacker has control on the account, but at the least the attacker can make purchases on the Kindle store using the victim&#8217;s credit card, and have access to any personal information stored on the device.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.329787234043\"><\/p>\n<p>As Bar-On explained in his <a href=\"https:\/\/medium.com\/realmodelabs\/kindledrip-from-your-kindles-email-address-to-using-your-credit-card-bb93dbfb2a08\"><span>blog post<\/span><\/a>, the attack could have started with a malicious ebook sent to the victim. A mitigating factor here is that the hacker needed to spoof the email address they used to match the @kindle.com email address used by the target. In some cases, these are not trivial to guess, as they can contain a series of random numbers. Bar-On, however, said that he believes hackers could have guessed them by brute forcing all potential combinations.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>The hacker would send the ebook to a victim, which would automatically appear in their Kindle library. Once the victim opened the ebook and clicked on a link in the table of contents, the Kindle would open a browser HTML page in the browser that contained a malicious image file. The Kindle would then parse the malicious code and let the hacker take over the device.&nbsp;<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"9\">\n<p><em><strong>Do you know of any similar security vulnerability or data breach? We\u2019d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email lorenzofb@vice.com<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>An Amazon spokesperson confirmed that the bugs found by Bar-On have been fixed, and said the bugs could not have allowed hackers to take over a victim&#8217;s Amazon account.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>&#8220;The security of our devices and services is a top priority. We have already released an automatic software update over the Internet fixing this issue for all Amazon Kindle models released after 2014,&#8221; the spokesperson said in an email. &#8220;Other impacted Kindle models will also receive this fix. We also have measures in place to help prevent customers from receiving content they haven\u2019t requested. We appreciate the work of independent researchers who help bring potential issues to our attention.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>Bar-On said that &#8220;there is no reason to suspect that this attack was actually exploited, and the devices should already be updated to the fixed firmware version. If the device is not updated, users should update immediately.&#8221;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>This is a good reminder that even devices that we may think are not risky in terms of getting hacked can actually leak personal information. And hackers could get some useful data by targeting them.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Amazon fixed these bugs on December 10 of last year, after Bar-On reported them on October 17.&nbsp;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><em>This story was updated to clarify that hackers could only spend money on the Kindle Store.<\/em><\/p>\n<p><\/span>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31953\/Bugs-Allowed-Hackers-To-Hijack-Kindle-Accounts-With-Malicious-Ebooks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39253,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9171],"class_list":["post-39252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackeramazonflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-22T15:05:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"673\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks\",\"datePublished\":\"2021-01-22T15:05:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg\",\"keywords\":[\"headline,hacker,amazon,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/\",\"name\":\"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg\",\"datePublished\":\"2021-01-22T15:05:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg\",\"width\":1200,\"height\":673},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,amazon,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackeramazonflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/","og_locale":"en_US","og_type":"article","og_title":"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-22T15:05:43+00:00","og_image":[{"width":1200,"height":673,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks","datePublished":"2021-01-22T15:05:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg","keywords":["headline,hacker,amazon,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/","url":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/","name":"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg","datePublished":"2021-01-22T15:05:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks.jpg","width":1200,"height":673},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bugs-allowed-hackers-to-hijack-kindle-accounts-with-malicious-ebooks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,amazon,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackeramazonflaw\/"},{"@type":"ListItem","position":3,"name":"Bugs Allowed Hackers To Hijack Kindle Accounts With Malicious Ebooks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39252"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39253"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}