"Amazon got hacked" messages are a false alarm

Amazon customers have been seeing a message on social media that has caused some alarm.
Hub lockers are local secure places for people to pick up their Amazon order rather than risk them being left on a doorstep, so the concern was that someone could buy something on your account and then send it to the Hub locker to be picked up.
If you do use Amazon lockers, be sure to verify that the locker you're sending it to is an actual locker.
It's not surprising that those messages would raise the alarm amongst Amazon's customers, but thankfully the security alert is nothing to worry about.
The additional addresses are genuine Hub locations or other pick-up locations and they weren't put there by hackers.
This isn't a data security matter and our systems are secure.
Amazon pickup locations were added to a small number of customer accounts in error, and we are working to fix the issue.
We apologize for any inconvenience this may have caused, and customers with questions about their account are welcome to contact customer service.
Things like this are tricky - on the one hand we are always pleased for people to share security issues and alert others to potential problems.
However in this case it appears as though people were forwarding the message without first checking if it was a real issue.
Nowadays with social media and instant messaging, rumours like these can spread fast.
All it takes is some panic, little research, and a lot of contacts.
If you see a message like this, always do a bit of research before forwarding it on.
Sites like Snopes allow you to search for keywords and you'll find a lot of hoaxes including this one.
We don't just report on threats-we remove them.
Cybersecurity risks should never spread beyond a headline.
Keep threats off your devices by downloading Malwarebytes today.


This Cyber News was published on www.malwarebytes.com. Publication date: Mon, 11 Dec 2023 15:43:04 +0000


Cyber News related to "Amazon got hacked" messages are a false alarm

"Amazon got hacked" messages are a false alarm - Amazon customers have been seeing a message on social media that has caused some alarm. Hub lockers are local secure places for people to pick up their Amazon order rather than risk them being left on a doorstep, so the concern was that someone could ...
1 year ago Malwarebytes.com
CyberCrime & Doing Time: Identification Documents: an Obsolete Fraud Countermeasure - When I'm talking to bankers and other fraud fighters, I often mention how easy it is for a criminal to obtain a Drivers License bearing any information they desire. In the new case, Brianna Mills, a 28-year old bank teller in Loganville, Georgia ...
1 year ago Garwarner.blogspot.com
CVE-2019-14261 - An issue was discovered on ABUS Secvest FUAA50000 3.01.01 devices. Due to an insufficient implementation of jamming detection, an attacker is able to suppress correctly received RF messages sent between wireless peripheral components, e.g., wireless ...
5 years ago
Microsoft Defender XDR False Positive Leads to Massive Data Leak of 1,700+ Sensitive Documents - According to a ANYRUN report shared with Cyber Security News , this error triggered a sudden influx of Adobe Acrobat Cloud links being uploaded to their sandbox for analysis. “We saw a sudden inflow of Adobe Acrobat Cloud links being uploaded to ...
1 month ago Cybersecuritynews.com
What Apple's Promise to Support RCS Means for Text Messaging - RCS will thankfully bring a number of long-missing features to those green bubble conversations in Messages, but Apple's proposed implementation has a murkier future when it comes to security. The RCS standard will replace SMS, the protocol behind ...
1 year ago Eff.org
Microsoft Addresses Entra ID Token Logging Issue, Alerts to Protect Users - Microsoft has acknowledged a recent issue that triggered widespread alerts in its Entra ID Protection system, flagging user accounts as high risk due to supposed credential leaks on the dark web. The alerts have been attributed to a combination of an ...
2 months ago Cybersecuritynews.com
Huawei, Vivo phones tag Google app as TrojanSMS-PA malware - Huawei, Honor, and Vivo smartphones and tablets are displaying strange 'Security threat' alerts urging the deletion of the Google app, warning that it is detected as the 'TrojanSMS-PA' malware. In what appears to be a false positive, these security ...
1 year ago Bleepingcomputer.com Rocke
PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK - The Qosmos Threat Detection Software Development Kit is Enea's innovative solution to the demand for more robust, adaptable, and high-performance network threat detection platforms. ADVANCED THREAT DETECTION WITH SUPERIOR TRAFFIC VISIBILITY. ...
1 year ago Cybersecurity-insiders.com
Meta Announces End-to-End Encryption by Default in Messenger - Yesterday Meta announced that they have begun rolling out default end-to-end encryption for one-to-one messages and voice calls on Messenger and Facebook. It will bring strong encryption to over one billion people, protecting them from dragnet ...
1 year ago Eff.org
CVE-2024-1522 - I have activated the CORS because I had a development ui that uses another port number then I forgot to remove it. So what I just did is : - First removed the cors configuration that allows everyone to access it : before: ```python sio = ...
1 year ago Tenable.com
CVE-2024-56337 - Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was ...
5 months ago Tenable.com CVE-2024-50379
CVE-2022-49882 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
CVE-2019-11561 - The Chuango 433 MHz burglar-alarm product line is vulnerable to a Denial of Service attack. When the condition is triggered, the OV2 base station is unable to process sensor states and effectively prevents the alarm from setting off, as demonstrated ...
4 years ago
CVE-2019-9659 - The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded ...
3 years ago
Threat Actors Leveraging Toll Payment Services in Massive Hacking Attack - The attackers have demonstrated remarkable sophistication in their ability to spoof official toll service communications, making it exceptionally difficult for average consumers to distinguish between legitimate messages and fraudulent ones. At the ...
2 months ago Cybersecuritynews.com
Smart Home Security Essentials: Protecting What Matters Most - Smart home security systems provide homeowners with the ability to keep their personal and property safe from intruders, theft, and other potential threats. This article will discuss different types of smart home security systems, benefits, setting ...
1 year ago Securityzap.com Meow
Ransomware Groups Gain Clout With False Attack Claims - The cybersecurity community is getting duped by fake breach claims from ransomware groups, experts say - and ransomware misinformation is a threat they predict will only grow in the coming months. The cybersecurity community should know that ...
1 year ago Darkreading.com
CVE-2015-8254 - The Frontel protocol before 3 on RSI Video Technologies Videofied devices does not use integrity protection, which makes it easier for man-in-the-middle attackers to (1) initiate a false alarm or (2) deactivate an alarm by modifying the client-server ...
9 years ago
10 Best Email Security Gateways in 2025 - Barracuda Email Security Gateway is a solution that helps protect organizations from email-borne threats such as spam, viruses, phishing, and other malicious content. It uses various methods, including filtering, encryption, and sandboxing, to ...
3 months ago Cybersecuritynews.com
Microsoft fixes Exchange Online bug flagging Gmail emails as spam - In a final update to the incident report added on May 1 at 16:31 UTC, Microsoft said it successfully reverted the buggy ML model to the previous working version, mitigating the false positive issue. It also added that admins and users may have ...
1 month ago Bleepingcomputer.com
How To Prioritize Threat Intelligence Alerts In A High-Volume SOC - This article explores practical strategies and frameworks for prioritizing threat intelligence alerts in high-volume SOC environments, helping security teams focus on what matters most while reducing alert fatigue and improving overall security ...
2 months ago Cybersecuritynews.com
CVE-2024-49870 - In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix dentry leak in cachefiles_open_file() A dentry leak may be caused when a lookup cookie and a cull are concurrent: P1 | P2 ...
8 months ago Tenable.com
CVE-2021-47640 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago