{"id":40970,"date":"2021-05-20T15:39:25","date_gmt":"2021-05-20T15:39:25","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32304\/Fraudsters-Employ-Amazon-Vishing-Attacks-In-Fake-Order-Scams.html"},"modified":"2021-05-20T15:39:25","modified_gmt":"2021-05-20T15:39:25","slug":"fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","title":{"rendered":"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams"},"content":{"rendered":"<p>Researchers have highlighted tactics used by fraudsters today in voice-based phishing campaigns.&nbsp; <\/p>\n<p>Phishing attempts involve fraudulent messages sent over email, social media networks, SMS, and other text-based platforms. They may appear to be from your bank, popular online services &#8212; such as PayPal or Amazon &#8212; or they may attempt to lure in victims with promises of tax rebates and competition prizes.&nbsp;<\/p>\n<p>These messages often contain malicious attachments designed to deploy malware, or they may try to direct victims to fake websites.&nbsp; <\/p>\n<p>So-called &#8220;vishing&#8221; is a subset of phishing techniques that combines &#8216;voice&#8217; and &#8216;phishing&#8217;. Victims may be cold-called or emails could contain phone numbers, voice notes, and messages &#8212; but the overall goal is the same: to swipe your personal data.&nbsp; <\/p>\n<p>Scam artists can employ &#8220;spray and pray&#8221; techniques in campaigns and blast out thousands of emails in one go, and now, voice over internet protocol (VoIP) technology has allowed fraudsters to do the same, all while spoofing their caller IDs and identities.&nbsp; <\/p>\n<p>In separate case studies published by Armorblox <a href=\"https:\/\/www.armorblox.com\/blog\/amazon-vishing-voice-phishing-attacks\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">on Thursday<\/a>, the team highlighted two Amazon vishing attacks intent on stealing customer credit card details &#8212; and how the use of voice messages can bypass existing spam filters.&nbsp; <\/p>\n<p>The first example vishing attempt, tracked to roughly 9,000 email inboxes, was sent from a Gmail account and contained the subject line: &#8220;Invoice:ID,&#8221; followed by an invoice number and content containing color markers used by Amazon.&nbsp; <\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>This email says that an order for a television and gaming console had been placed &#8212; a purchase worth hundreds of dollars &#8212; and urges the recipient to contact them using a phone number if there are any errors.&nbsp; <\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/\" class=\"lazy\" alt=\"screenshot-2021-05-17-at-08-59-48.png\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/17\/64974fe1-c215-41f4-b145-ca3efaf4947f\/resize\/470xauto\/cd6bbc4950c110a4fd24fbfc99d5d704\/screenshot-2021-05-17-at-08-59-48.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/17\/64974fe1-c215-41f4-b145-ca3efaf4947f\/resize\/470xauto\/cd6bbc4950c110a4fd24fbfc99d5d704\/screenshot-2021-05-17-at-08-59-48.png\" class alt=\"screenshot-2021-05-17-at-08-59-48.png\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Armorblox <\/span><\/figcaption><\/figure>\n<p>Armorblox called the &#8216;payload&#8217; phone number and a person on the other end of the line answered, pretending to be from Amazon customer service. The scammer requested the order number, customer name, and credit card details before cutting the call and blocking the number.&nbsp; <\/p>\n<p>According to the researchers, the use of a zero in &#8220;AMAZ0N TEAM&#8221; helped the message bypass existing spam filters, including Microsoft Exchange Online Protection (EOP) and Microsoft Defender for Office 365 (MSDO). A spam level of &#8220;1&#8221; was assigned to the email, which means that the message was not considered fraudulent.&nbsp;<\/p>\n<p>In the second example, which reached roughly 4,000 inboxes and was also able to circumvent EOP and MSDO, fraudsters impersonated Amazon via a spoofed email address &#8212; &#8220;no-reply@amzeinfo[.]com&#8221; &#8212; and used the subject line, &#8220;A shipment with goods is being delivered.&#8221; <\/p>\n<p>The email contained an order number, a payment amount of $556.42, and another phone number &#8216;payload&#8217; for customers to make return requests. However, in this case, the researchers found that the scam appeared to have been shut down as the phone number was not in service. <\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/\" class=\"lazy\" alt=\"screenshot-2021-05-17-at-09-00-55.png\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/17\/db929cae-4d4e-465c-8ab1-4787cbf3151b\/resize\/470xauto\/a14e96c4a6e2fe2f8c5bedccd4b1b4ff\/screenshot-2021-05-17-at-09-00-55.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/17\/db929cae-4d4e-465c-8ab1-4787cbf3151b\/resize\/470xauto\/a14e96c4a6e2fe2f8c5bedccd4b1b4ff\/screenshot-2021-05-17-at-09-00-55.png\" class alt=\"screenshot-2021-05-17-at-09-00-55.png\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><\/figcaption><\/figure>\n<p>As the emails did not contain malicious attachments or links, this allowed the fraudsters to bypass spam filters. <\/p>\n<p>In both cases, the fraudsters used a combination of social engineering, brand impersonation, and emotive triggers &#8212; the apparent loss of hundreds of dollars &#8212; to induce victims into calling them. If successful, victims could end up handing over their personal data and credit card details, leading to consequences such as identity theft or fraudulent payments made on their behalf.&nbsp; <\/p>\n<p>As many of us remain at home due to the pandemic and we&#8217;ve come to rely more heavily on online shopping, fraudsters will continue to try and exploit these trends. In August, the FBI and US Cybersecurity and Infrastructure Security Agency (CISA) issued <a href=\"https:\/\/www.zdnet.com\/article\/fbi-and-cisa-warn-of-major-wave-of-vishing-attacks-targeting-teleworkers\/\" target=\"_blank\" rel=\"noopener noreferrer\">a joint advisory<\/a> warning of an increase in vishing attacks against the private sector.&nbsp; <\/p>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32304\/Fraudsters-Employ-Amazon-Vishing-Attacks-In-Fake-Order-Scams.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9384],"class_list":["post-40970","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinephoneamazoncybercrimefraudpasswordphish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T15:39:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams\",\"datePublished\":\"2021-05-20T15:39:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\"},\"wordCount\":637,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\",\"keywords\":[\"headline,phone,amazon,cybercrime,fraud,password,phish\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\",\"name\":\"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\",\"datePublished\":\"2021-05-20T15:39:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,amazon,cybercrime,fraud,password,phish\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephoneamazoncybercrimefraudpasswordphish\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","og_locale":"en_US","og_type":"article","og_title":"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-20T15:39:25+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams","datePublished":"2021-05-20T15:39:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/"},"wordCount":637,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","keywords":["headline,phone,amazon,cybercrime,fraud,password,phish"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","url":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","name":"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","datePublished":"2021-05-20T15:39:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/","contentUrl":"https:\/\/www.zdnet.com\/article\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fraudsters-employ-amazon-vishing-attacks-in-fake-order-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,amazon,cybercrime,fraud,password,phish","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephoneamazoncybercrimefraudpasswordphish\/"},{"@type":"ListItem","position":3,"name":"Fraudsters Employ Amazon Vishing Attacks In Fake Order Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40970"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40970\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}