Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security

Amazon hacked – hacker leaks 80,000 login credentials

Paul Anderson by Paul Anderson
July 10, 2016
in Security, Data Breaches
0
76
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

A hacker going by the name 0x2Taylor has said to have breached the servers of the digital market leader Amazon and leaking login credentials of 80,000 customers.

You might also like

Shanghai National Police database hacked – 1 billion Chinese citizens leaked

Cloudflare Stops Record-Breaking DDoS

Chrome Browser Extension Vytal Prevents Privacy Leaks

The 597.4 MB leaked data contains usernames and encrypted passwords of Amazon Kindle customers. The hacker claims he targeted Amazon as the company did not respond or pay any attention to his reports of a vital security flaw in their server. Previously, 0x2Taylor also took responsibility for hacking the Baton Rouge police department after Alton Sterling was fatally shot by two of their officers.

0x2Taylor tweets Amazon hack

The hacker told sources “When they first got Kindles and set them up, all their stuff was being logged and put into a database that includes a user’s email, password, city, state, phone number, zip code, user-agent, LastLoginIP, Proxy IP and street.”

Amazon-hacked-80,000-credentials-leaked-1

0x2Taylor also disclosed that he wanted a bounty of $700 from Amazon and he would guarantee that the info won’t be leaked, but, just as the the vulnerability report, Amazon also dismissed his offer so he uploaded the data dump on Maga.nz for the public.

The leaked file was scanned by data mining company Hacked-DB who confirm that the data is legit and never been leaked online before.

However, Amazon has a bug bounty and vulnerability reporting program, so it’s still not clear why the corporation did not reply to the hacker.

Tags: 0x2Tayloramazonhacked
Share31Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Shanghai National Police database hacked – 1 billion Chinese citizens leaked

by Paul Anderson
July 7, 2022
0
Shanghai China police database hack

A hacker going by the pseudonym "ChinaDan" has posted a thread on a popular hacking forum BreachForums, stating that they are selling Shanghai's National police database (SHGA). The...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

Healthcare Provider Kaiser Permanente Suffers Data Breach Impacting 70k Patients

by Paul Anderson
June 18, 2022
0
Kaiser Permanente suffers data breach

Founded in July 1945, Kaiser Permanente is an integrated managed care consortium with its headquarters located in Oakland, California. Kaiser is arguably the largest non-profit health care and...

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more
Next Post
Exploit Kit activity on a steep decline since April

Exploit Kit activity on a steep decline since April

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.