Amazon Fake Reviews Scam Exposed in Data Breach
The cybersecurity team over at Safety Detectives got in touch with us about a data breach they had identified which affected Amazon and a Fake Review operation. This breach affects both customers and vendors and as such, they wanted to bring it to our attention. Below you can find in their own words what they had managed to uncover.
“The SafetyDetectives cybersecurity team uncovered an open ElasticSearch database exposing an organized fake reviews scam affecting Amazon.
The server contained a treasure trove of direct messages between Amazon vendors and customers willing to provide fake reviews in exchange for free products. In total, 13,124,962 of these records (or 7GB of data) have been exposed in the breach, potentially implicating more than 200,000 people in unethical activities.
While it is unclear who owns the database, the breach demonstrates the inner workings of a prevalent issue affecting the online retail industry.
How the Process Works
The information found on the open ElasticSearch server outlines a common procedure by which Amazon vendors procure ‘fake reviews’ for their products.
These Amazon vendors send to reviewers a list of items/products for which they would like a 5-star review. The people providing the ‘fake reviews’ will then buy the products, leaving a 5-star review on Amazon a few days after receiving their merchandise.
Upon completion, the provider of the fake review will send a message to the vendor containing a link to their Amazon profile, along with their PayPal details.
Once the Amazon vendor confirms all reviews have been completed, the reviewer will receive a refund through PayPal, keeping the items they bought for free as a form of payment.
The refund for any purchased goods is actioned through PayPal and not directly through Amazon’s platform. This makes the five-star review look legitimate, so as not to arouse suspicion from Amazon moderators.
In some cases, there may be an additional payment – based on the scale of the services provided by the person posting fake reviews. However, we didn’t find any examples of this in the exposed server.
What was Leaked?
More than 13 million records, equating to 7GB of data, were exposed when the unclaimed ElasticSearch server was left open without any password protection or encryption. The personal data of people providing fake reviews, as well as Amazon vendors, could be found in leaked messages on the database.
- Data related to the vendors
These messages contained various examples of contact details from the vendors:
- Email addresses
- WhatsApp and Telegram phone numbers
Contact details were given to the potential fake review providers to continue communications outside of the services where these leaked interactions had taken place.
Contact details of vendors, such as email addresses
- Data related to the reviewers
Messages on the ElasticSearch also contained other forms of directly and indirectly identifiable personal data exposing the reviewers themselves, such as:
- 75K links to Amazon accounts/profiles of review sellers
- PayPal account details (email addresses)
- Email addresses
- ‘Fan names’ – supposedly usernames, often containing names & surnames
Links to Amazon accounts
Leaked PayPal account details and ‘fan names’ outline email addresses, and what seems to be the usernames of people providing fake reviews. These details could be used to indirectly identify individuals, while many of them contained full names and surnames.
The Gmail addresses of reviewers were also provided to vendors directly via message. In total, 232,664 Gmails have been exposed on the server, though some of the email addresses were duplicates.
PayPal emails of fake reviewers
The ‘Gmail’ figure covers only those individuals who use Google as their mail provider. When we factor in the presence of other types of email accounts, such as Outlook, the enormity of this breach becomes apparent. 75,000 Amazon accounts were leaked as well, although there are potentially several duplicates included in this figure. Along with Amazon vendors compromised through their contact details, it’s reasonable to estimate that around 200,000-250,000 people were affected by this breach.
The server appeared to be located in China, and it is thought the leak affected citizens from Europe and the USA at a minimum. In reality, the leak could have affected individuals from all corners of the world.
Number of records leaked | + 13M |
Number of affected users | Estimated 200-250K |
Size of breach | 7 GB |
Server location | China |
Company location | Potentially China* |
*Records that were unrelated to messages between vendors and reviewers were written in Chinese, which is why we assume the owners of the server were located in China.
The SafetyDetectives cybersecurity team discovered the breach on March 1st, 2021. We monitored the status of the open ElasticSearch server over the following days, and on March 6th, 2021, the unclaimed database was secured.
We were unable to identify the owner of the ElasticSearch server. As a result, we could not notify the company in question regarding this security issue. Nonetheless, the server was secured a few days later making it inaccessible to outside parties.
Given the extent of the records and vendors included in the database, it’s possible that the server is not owned by the Amazon vendors running the scam. The server could be owned by a third party that reaches out to potential reviewers on behalf of the vendors. Third-parties might post a picture of the product in a Facebook or WeChat group, asking for reviews in return for free products.
The server could also be owned by a large company with several subsidiaries, which would explain the presence of multiple vendors.
What’s clear is that whoever owns the server could be subject to punishments from consumer protection laws, and whoever is paying for these fake reviews may face sanctions for breaking Amazon’s terms of service.
Avoiding Detection
Amazon vendors running this type of ‘fake review scam’ are able to avoid detection from Amazon’s review moderation team.
Implicated vendors can avoid detection across multiple platforms, too. This is a big reason why online marketplaces are struggling to contain the issue of ‘fake reviews,’ which is now widespread across the entire industry.
Messages in the unclaimed ElasticSearch server highlighted techniques that are employed by businesses to cover their tracks.
Fraudulent businesses give reviewers specific criteria to follow to avoid detection on Amazon. These criteria are designed to present the reviews as legitimate. In this ElasticSearch server, vendors asked reviewers to wait a few days before publishing a review. They also request substantial reviews that are longer than just a few words, and may even outline certain details that should be included in the review.
Instructions were sent to reviewers to make the reviews more credible.
Some vendors requested reviews over a specific word count
Vendors often conduct their communications through direct messaging apps. In the ElasticSearch server we discovered, vendors attempted to hide keywords with similar phrases that bypass keyword searches.
This could imply that the platforms used to liaise with potential reviewers were not intended for this purpose, and vendors are likely attempting to evade detection from security technicians.
Amazon vendors are disguising keywords to evade detection
We’re confident some of these interactions were taking place on Facebook, though it seems communications with potential reviewers occurred across several messaging platforms.
The owners of the database may have used a CRM system to aggregate these different channels of communication onto one easy platform, storing the data on the unclaimed ElasticSearch server. However, this is merely an educated assumption.
Posing as a Genuine Service
Although a lot of people providing fake reviews likely know what they’re doing, we must also highlight how vendors don’t advertise that fake reviews are illegal.
Unassuming people may have been targeted by Amazon vendors with the offer of free products in return for a review. Vendors use ‘professional’ language to present the offer as legitimate trade, utilizing phrases like ‘testing’ and ‘free product trials’ when they message prospective reviewers. This is certainly the case in the database we detected.
Without knowledge of marketing law, Amazon terms of service, or the wider impact fake reviews can have, some individuals may think nothing of collaborating with an Amazon vendor to conduct a fake review.
When considering those who are implicated in this breach, and the impacts they could face because of this exposure, we should be mindful that some of these reviewers have been misled themselves.
Impacts
The owners of the ElasticSearch server have essentially committed two separate offenses. On one hand, companies and individuals have been connected with the production of misleading marketing materials. On the other hand, a data breach in itself has further damages for the persons/business(es) involved.
Punishments for Fake Reviews
So, what are the wider implications for people giving fake reviews, and the Amazon vendors that pay for these fake reviews?
We can split these impacts into two different types: Corporate punishments and individual punishments.
Corporate Punishments
Businesses or individual vendors that are found to be buying fake reviews for their products could face various penalties and sanctions for this type of transgression.
Firstly, Amazon vendors have broken Amazon’s terms of service through buying fake reviews.
Amazon can place a number of sanctions on guilty parties. Vendor accounts can be terminated permanently, and vendors can lose their selling privileges with an immediate effect. Amazon will withhold all earnings from pending transactions – where products have been sold, but earnings have not yet been collected by the vendor.
The reviews will be removed from any product page that is found to contain fake reviews, and that product will not be able to receive reviews or ratings in the future. Products can even be delisted from the site altogether.
Amazon retains the right to disclose the vendor’s name (and any other related information) publicly. An exercise that highlights the fraudulent company’s wrongdoings to warn those who may have been affected, while causing reputational damage to the business in question.
Amazon’s terms of service outline that Amazon may choose to pursue legal action against the business involved.
In several countries, paying people to conduct fake reviews is an illegal practice that damages the rights of consumers. If a company purchasing fake reviews is based in the United States, it would face lawful action from the Federal Trade Commission (FTC). Using deceptive marketing tactics could land a US-based vendor with a heavy penalty of more than $10 million.
Individual Punishments
The breach also means people exposed as ‘fake review sellers’ may be subject to lawful punishment themselves. Whether individuals are found to be guilty of selling reviews or not would make a huge difference to the consequences they could face. If reviewers are found to have been ‘misled,’ punishments could be vastly reduced and the individuals may only receive a ‘slap on the wrist.’
Fraudulent reviewers with thousands of fake reviews to their name can pay penalties of more than $10,000, and could even receive a jail sentence. The severity of these punishments would depend on whichever jurisdiction is in control of the investigation.
The Amazon accounts of fake reviewers will likely be terminated as well, though Amazon’s primary focus is on pursuing guilty vendors rather than investigating each individual reviewer.
Data Breach Impact
The reputational and financial damage provoked by a data breach of this nature is tangible. On top of the above penalties and charges, if the ElasticSearch database owner was to be identified they could face further sanctions for breaking data protection laws.
All of the jurisdictions involved in such cases are unclear until we know the citizenship of individuals who have had their data leaked. The fraudulent owner of the server seems to be based in China. A serious breach of data protection laws there could land the owner with fines up to $7.6 million, or 5% of the company’s turnover from the previous year.
If individuals from other nations are affected, other jurisdictions could also carry out investigations. Any damages to American citizens could involve the FTC, which can fine businesses up to $100 million, while European citizens are protected by GDPR. If the data of European citizens is mishandled, a fine of around €20 million (or 4% of a companies income) could be charged to the owner of the database.
The data breach, along with any additional crimes, will perceivably cause reputational damage to businesses tied to such an event. Future customers may choose to avoid businesses involved in lawsuits, unlawful activities, or poor data protection practices.
The personal information of hundreds of thousands of people can be found on the database, and this puts those individuals in harm’s way of hackers and cybercriminals.
It is currently unknown whether hackers accessed the open ElasticSearch server. If hackers have accessed the server, the emails, names, and surnames of affected reviewers and vendors could be used to target people with scams, phishing attacks, fraud, and even blackmail.
With something as simple as an email address, a hacker could launch a phishing attack. Here they would send a targeted email, using personal data to speak directly to the victim and build an element of trust. The email will attempt to convince a victim to click on a link, whereby malicious files are downloaded onto that person’s computer. These malicious files provide the basis for hackers to conduct further criminal activities, such as fraud.
Hackers can attempt scams through targeted emails, too, by convincing parties to buy a product or send over details that would facilitate fraudulent attacks. Hackers could build trust by referring to the products reviewers have tested, or they could use PayPal as the focus of their attack.
Hackers could pose as a representative of PayPal, requesting that users ‘update their password.’ Once users have passed on their PayPal password to the hacker, the hacker will gain access to that person’s PayPal account – draining it of funds.
Hackers can pepper leaked PayPal accounts with generated passwords until they gain access. Once into a PayPal account, there’s additional personal information that hackers can use to build trust and focus their attacks. For example, transaction history could be used to pose as a representative of another business.
The server contained incriminating information for thousands of people and businesses, information that those parties may not wish to be available to regulatory or investigative authorities. The obvious risk associated with incriminating data means hackers could target victims with blackmail. Once hackers have obtained the data, they could demand huge amounts of money or information from individuals and vendors, with the threat of releasing the incriminating files should the victim fail to comply.”
Once again a huge shout-out to the team at Safety Detectives for bringing this to our attention for our readers. You can see their full report here.
If you liked this article and would like to engage with other small business entrepreneurs selling on marketplaces, join our . You can also find us on , , , and or sign up for our newsletter below.
SIGN UP. BE INSPIRED. GROW YOUR BUSINESS.
We do not sell your information. You can unsubscribe at any time.
Dave Furness
Dave is a Co-Founder of eSeller365. For over 10 years he has been involved with eCommerce with a particular interest in the marketplaces and the huge opportunities available for sellers when utilizing a multi-channel strategy. After a year of being the UK’s youngest eCommerce consultant, he built an education platform called UnderstandingE that showed the world how to utilize Magento as the “Third Generation of Multi-Channel software”.
Dave has also created a YouTube channel dedicated to entrepreneurship and eCommerce as well as a podcast dedicated to mental health awareness. When Dave isn’t working his main interests include learning and playing Chess, researching the Crypto and NFT space, and trying to find the nearest beach.