Protect Yourself During Amazon Prime Days!

Protect Yourself During Amazon Prime Days!

Protect Yourself During Amazon Prime Days

Amazon Prime Day is just around the corner, taking place from July 12th to July 13th, 2022. Prime Day is a 48-hour event where exclusive deals on the latest trending items in every category imaginable are made available. Since 2015, this annual event has created a recurring opportunity for cybercriminals to capitalize and take advantage of eager shoppers.

Cybercriminals stay up to date on the latest trends to ensure their pretexts are topical and cover the widest audience possible. In the past, cybercriminals have registered lookalike domains, cloned Amazon’s homepage, and sent both fraudulent emails (phishing), phone calls (vishing) and text messages (Smishing), all with the intent of capturing the consumer’s personal data and credit card information. It should come as no surprise that in 2022, cybercriminals have continued to leverage Prime Day as narrative in campaigns.

Thankfully, there are multiple ways to protect yourself from Prime Day related scams this year. Netragard recommends keeping the following security advice in mind as Prime Day approaches this year:

  • Enable Two-Step Verification in the “Login & Security” section of your Amazon account. Enabling this setting will require a one-time code to be provided at login.
  • Refrain from clicking links in an email or text message from “Amazon” about a Prime Day deal, update to your account, or order being placed. Instead, navigate to and verify the information received on the official site. If you are still unsure, contact an official Amazon representative from the official Amazon Help page.
  • Trust your gut. If something seems phishy – don’t engage. When a deal seems too good to be true, it most likely is. Do research ahead of time to ensure that you’re properly educated on what Prime Day offers, and what may be a scam.


Prime Day is one of the many events that cybercriminals leverage as a narrative every year in their malicious campaigns. Netragard’s social engineering services strive to emulate a realistic threat and protect you from people like us. If you are interested in performing a realistic social engineering assessment, get in touch with us!

Dominic Clark, Netragard
Senior Penetration Tester

Blog Posts

Karen Huggins

Chief Financial, HR and Admin Officer
Karen joined the Netragard team in 2017 and oversees Netragard’s financial, human resources as well as administration functions. She also provides project management support to the operations and overall strategy of Netragard.
Prior to joining Netragard, she worked at RBC Investor Services Bank in Luxembourg in the role of Financial Advisor to the Global CIO of Investor Services, as well as several years managing the Financial Risk team to develop and implement new processes in line with regulatory requirements around their supplier services/cost and to minimize the residual risk to the organization.
With over 20 years of experience in finance with global organizations, she brings new perspective that will help the organization become more efficient as a team. She received her Bachelor of Finance from The Florida State University in the US and her Master of Business Administration at ESSEC Business School in Paris, France.

Philippe Caturegli

Chief Hacking Officer
Philippe has over 20 years of experience in information security. Prior to joining Netragard, Philippe was a Senior Manager within the Information & Technology Risk practice at Deloitte Luxembourg where he led a team in charge of Security & Privacy engagements.

Philippe has over 10 years of experience in the banking and financial sector that includes security assessment of large and complex infrastructures and penetration testing of data & voice networks, operating systems, middleware and web applications in Europe, US and Middle East.

Previously, Philippe held roles within the information system security department of a global pharmaceutical company in London. While working with a heterogeneous network of over 100,000 users across the world and strict regulatory requirements, Philippe gained hands-on experience with various security technologies (VPN, Network and Application Firewalls, IDS, IPS, Host Intrusion Prevention, etc.)

Philippe actively participates in the Information Security community. He has discovered and published several security vulnerabilities in leading products such as Cisco, Symantec and Hewlett-Packard.

He is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), PCI Qualified Security Assessors (PCI-QSA), OSSTMM Professional Security Analyst (OPSA), OSSTMM Professional Security Tester (OPST), Certified in Risk and Information Systems Control (CRISC)and Associate Member of the Business Continuity Institute (AMBCI).

Adriel Desautels

Chief Technology Officer
Adriel T. Desautels, has over 20 years of professional experience in information security. In 1998, Adriel founded Secure Network Operations, Inc. which was home to the SNOsoft Research Team. SNOsoft gained worldwide recognition for its vulnerability research work which played a pivotal role in helping to establish today’s best practices for responsible disclosure. While running SNOsoft, Adriel created the zeroday Exploit Acquisition Program (“EAP”), which was transferred to, and continued to operate under Netragard.
In 2006, Adriel founded Netragard on the premise of delivering high-quality Realistic Threat Penetration Testing services, known today as Red Teaming. Adriel continues to act as a primary architect behind Netragard’s services, created and manages Netragard’s 0-day Exploit Acquisition Program and continues to be an advocate for ethical 0-day research, use and sales.
Adriel is frequently interviewed as a subject matter expert by media outlets that include, Forbes, The Economist, Bloomberg, Ars Technica, Gizmodo, and The Register. Adriel is often an invited keynote or panelist at events such as Blackhat USA, InfoSec World, VICELAND Cyberwar, BSides, and NAW Billion Dollar CIO Roundtable.