{"id":26474,"date":"2025-12-16T07:57:46","date_gmt":"2025-12-16T07:57:46","guid":{"rendered":"http:\/\/tezgyan.com\/index.php\/2025\/12\/16\/fake-ebooks-how-hackers-can-use-kindles-to-take-over-your-amazon-account-tech-news\/"},"modified":"2025-12-16T07:57:46","modified_gmt":"2025-12-16T07:57:46","slug":"fake-ebooks-how-hackers-can-use-kindles-to-take-over-your-amazon-account-tech-news","status":"publish","type":"post","link":"https:\/\/tezgyan.com\/index.php\/2025\/12\/16\/fake-ebooks-how-hackers-can-use-kindles-to-take-over-your-amazon-account-tech-news\/","title":{"rendered":"Fake eBooks: How Hackers Can Use Kindles To Take Over Your Amazon Account | Tech News"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div id=\"story-9772714\">\n<p><span class=\"jsx-395e0e0beb19cb6e jsx-3759419209\">Last Updated:<\/span><time class=\"jsx-395e0e0beb19cb6e jsx-3759419209\">December 16, 2025, 12:29 IST<\/time><\/p>\n<h2 id=\"asubttl-9772714\" class=\"jsx-ee90caf6118df965 jsx-162622324 asubttl-schema\">Kindles are popular because you can store thousands of e-books and clear up the space in your home. But does this device pose hacking risks?<\/h2>\n<div class=\"jsx-cc1b15cf85effb8b artsharwrp\"><a href=\"https:\/\/news18.co\/gnps-en-btn\" target=\"_blank\" class=\"jsx-91f4da8d48c13a79 gglebtn bgylw\"\/><\/p>\n<div id=\"artshare\" class=\"jsx-cc1b15cf85effb8b artshare\">\n<div class=\"jsx-cc1b15cf85effb8b stickdiv\">\n<div class=\"jsx-cc1b15cf85effb8b deskwrapstkdiv\">\n<div class=\"jsx-cc1b15cf85effb8b fontchange\"><img decoding=\"async\" src=\"https:\/\/images.news18.com\/dlxczavtqcctuei\/news18\/static\/images\/english\/font.svg\" height=\"30px\" width=\"30px\" alt=\"font\" title=\"font\" class=\"jsx-cc1b15cf85effb8b lazyload\"\/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"jsx-ee90caf6118df965 jsx-162622324\">\n<figure class=\"jsx-ee90caf6118df965 jsx-162622324 amimg\"><img decoding=\"async\" alt=\"Amazon Kindle has an e-book attack problem that you should know\" title=\"Amazon Kindle has an e-book attack problem that you should know\" src=\"https:\/\/images.news18.com\/ibnlive\/uploads\/2021\/07\/1627283897_news18_logo-1200x800.jpg?impolicy=website&amp;width=400&amp;height=225\" loading=\"eager\" fetchpriority=\"high\" class=\"jsx-ee90caf6118df965 jsx-162622324\"\/><\/p>\n<p>Amazon Kindle has an e-book attack problem that you should know<\/p>\n<\/figure>\n<\/div>\n<p id=\"0\" class=\"story_para_0\"><span style=\"font-weight:400\">Kindles are popular e-readers in the market, so much that people started associating the product as the category (like Maggi and other products). However, having this much clout makes them easy targets for hackers who seem to have devised new ways to hijack your Amazon account and Kindle becomes the pathway to achieve that.\u00a0<\/span><\/p>\n<p id=\"1\" class=\"story_para_1\"><span style=\"font-weight:400\">The threat was demonstrated by a security expert at a recent convention in London and the method used to hack the device and the full account will have people worried for the device\u2019s security.\u00a0<\/span><\/p>\n<p id=\"2\" class=\"story_para_2\"><span style=\"font-weight:400\"><strong>Amazon Kindle Hack Issue: Your Account In Danger<\/strong>\u00a0<\/span><\/p>\n<p id=\"3\" class=\"story_para_3\"><span style=\"font-weight:400\">For a long time we have been told that Kindles are hard to hack but security has evolved and so have the threats. The recent event showcased how bad actors can infect a Kindle with a malicious e-Book, just like how an Android phone can be attacked with dangerous fake apps.\u00a0<\/span><\/p>\n<p id=\"4\" class=\"story_para_4\"><span style=\"font-weight:400\">The analyst from a company called Thales, quoted in this <a href=\"https:\/\/www.tomsguide.com\/computing\/online-security\/critical-amazon-kindle-flaw-could-let-hackers-take-over-your-account-dont-fall-for-this\" rel=\"nofollow\">report<\/a>, did exactly that which enabled him to exploit a security issue with Kindle e-readers. Not only were they able to use the signed in credit card to buy more e-books but also access the Amazon account on which the Kindle was working.\u00a0<\/span><\/p>\n<p id=\"5\" class=\"story_para_5\"><span style=\"font-weight:400\"><strong>The Sideloading Risks<\/strong>\u00a0<\/span><\/p>\n<p id=\"6\" class=\"story_para_6\"><span style=\"font-weight:400\">The malicious app was routed onto the Kindle using the sideloading method for apps which has been a concern but most have advocated for its support. The expert injected the malicious e-Book by sideloading it to the device which then was able to extract the right codes to take control of the Kindle and the Amazon account. <\/span><\/p>\n<p id=\"7\" class=\"story_para_7\"><span style=\"font-weight:400\">It was able to execute tasks like using the credit card to buy books and with the Amazon access the hacker can do a lot more damage, even shopping incessantly.\u00a0<\/span><\/p>\n<p id=\"8\" class=\"story_para_8\"><span style=\"font-weight:400\"><strong>How To Stay Safe<\/strong>\u00a0<\/span><\/p>\n<p id=\"9\" class=\"story_para_9\"><span style=\"font-weight:400\">The fact that eBooks can be the weapon to attack your Kindle means you need to be thorough about the book title, its source and other aspects before downloading them to your Kindle. This practice is similar to experts asking you to be vary of installing apps from unknown sources on the smartphone and the same goes for Kindle risks as well.\u00a0<\/span><\/p>\n<p id=\"10\" class=\"story_para_10\"><span style=\"font-weight:400\">The good thing is that the security issues related to the Kindle have been patched but we expect similar risks to show up at regular intervals and this demo gives people more reasons to be mindful of such attacks. <\/span><\/p>\n<div class=\"jsx-ff4fe2ed9527ebb3 midgprfd\">\n<div class=\"jsx-ff4fe2ed9527ebb3 midgprfdbtn\"><img decoding=\"async\" src=\"https:\/\/images.news18.com\/dlxczavtqcctuei\/news18\/static\/images\/english\/google-color.svg\" width=\"36\" height=\"36\" alt=\"\" class=\"jsx-ff4fe2ed9527ebb3\"\/><span class=\"jsx-ff4fe2ed9527ebb3\">Click here to add News18 as your preferred news source on Google. <\/span><\/div>\n<\/div>\n<div class=\"jsx-ee90caf6118df965 jsx-162622324 atbtlink fp\"><span>First Published:<\/span><\/p>\n<div class=\"rs\">\n<p>December 16, 2025, 12:29 IST<\/p>\n<\/div>\n<\/div>\n<div class=\"jsx-ee90caf6118df965 jsx-162622324 brdcrmb\"><a href=\"https:\/\/www.news18.com\/\">News<\/a>  <a href=\"https:\/\/www.news18.com\/tech\/\">tech<\/a>  <span class=\"brdout\"> Fake eBooks: How Hackers Can Use Kindles To Take Over Your Amazon Account<\/span><\/div>\n<div id=\"coral-wrap\" class=\"jsx-ba4d8f086a12294f \">\n<div class=\"jsx-ba4d8f086a12294f coral-cont\">\n<div class=\"jsx-ba4d8f086a12294f coltoptxt\">Disclaimer: Comments reflect users\u2019 views, not News18\u2019s. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our <a href=\"https:\/\/www.news18.com\/disclaimer\/\" class=\"jsx-ba4d8f086a12294f\">Terms of Use<\/a> and <a href=\"https:\/\/www.news18.com\/privacy_policy\/\" class=\"jsx-ba4d8f086a12294f\">Privacy Policy<\/a>.<\/div>\n<\/div>\n<\/div>\n<p><span class=\"jsx-ee90caf6118df965 jsx-162622324 rmbtn news18_read_more\">Read More<\/span><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.news18.com\/tech\/fake-ebooks-how-hackers-can-use-kindles-to-take-over-your-amazon-account-9772714.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last Updated:December 16, 2025, 12:29 IST Kindles are popular because you can store thousands of e-books and clear up the space in your home. But does this device pose hacking risks? Amazon Kindle has an e-book attack problem that you should know Kindles are popular e-readers in the market, so much that people started associating&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6040,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[],"class_list":["post-26474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/posts\/26474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/comments?post=26474"}],"version-history":[{"count":0,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/posts\/26474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/media\/6040"}],"wp:attachment":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/media?parent=26474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/categories?post=26474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/tags?post=26474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}