More specifically, as Amazon's security service, which would have detected suspicious activity.
At least that's what this email claims. This is of course a fictitious argument intended to unsettle the recipients of this email. Because of this uncertainty, the link in the email leads to a website that claims to be Amazon, but is not Amazon.
Important note: Amazon has nothing to do with the scam . They themselves became victims here because their name, logo and corporate design were misused to lure users into a trap! Since the email is sent blindly, it naturally also reaches users who do not have an Amazon account.

The content is in barrier-free plain text:
Dear customer,
Suspicious activity has been detected on your Amazon account. We at Amаzon.de take customer security extremely seriously. For security reasons, you must confirm your personal data in your user account. Until then, your user account will be restricted.
This security measure protects you from misuse by third parties.
When confirming, you must enter all the necessary information about your user account and payment details, otherwise you will no longer be able to make further purchases.
Click on the link below and follow the instructions.
If it is found that you are entering incorrect information / incorrect payment details or ignoring this confirmation, your user account will be completely blocked and you will be reported to our security department.Next (via the security server)
After confirmation, your account will be reactivated.
We thank you for your understanding.
Content, structure and argument are of course important in a phishing scam via email; there are a number of errors in this email, especially when it comes to the capitalization of words. Amazon was chosen as the sender information because many people have an Amazon account and feel addressed.
Phishing!
The supposed security check takes place on a website that claims to be Amazon. In our test run, our security software directly prevented the fake website from being created.
Without protection software , a website posing as Amazon is loaded. However, this website does not belong to Amazon, but contains a fake portal. All entries made here end up directly in the hands of fraudsters.
If you fall into such a phishing trap, the following measures can help: Despite all caution, it can still happen from time to time that you have fallen victim to a phishing attack and have unintentionally revealed your personal data to third parties. It is important not to panic and to act immediately!

So that you actually know what to do if the worst comes to the worst, simply follow our step-by-step instructions:
- Contact the company for which your personal user or login information was stolen immediately. Please call customer service to have your account blocked. Banks in particular have a blocking hotline that can be reached around the clock and is available specifically for such and similar cases. Describe your case and your account or user area will no longer be accessible with the old login data.
- Log in to your user account and check whether you can still log in. If this is still possible, go immediately to the area where you can change your current login details. Set a new password and, if possible, also change the user name and contact address.
- Check immediately whether account changes or transactions have already been made , as criminals are usually very quick. Check whether, for example, goods have been purchased or debits have been made for which you are not responsible. If this is the case, inform the customer service of the respective provider immediately.
- Document all abnormalities . Take screenshots, print out bank statements and the phishing email, or forward the email to the company in whose name the cybercriminals sent the phishing email.
- Contact a lawyer who specializes in internet fraud , describe your case and submit all documents related to the fraud. You should contact the lawyer even if you have not yet reported any damage.
- 2 -factor authentication (if offered) prevents access even if fraudsters have obtained the access data through phishing.
By the way, there is also hope in phishing that stolen funds, for example from online banking, will be replaced by banks. The basis for this is the Civil Code (BGB). According to § 675u BGB, payment service providers are obliged to replace the stolen payment amounts in the event of unauthorized payment transactions. However, this only applies if the person concerned has fulfilled their duty of care. Further information on the legal basis in the event of damage can be found here .
“Whether you believe that or not. It is like that."
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )


