Disclaimer: We may earn a commission if you make any purchase by clicking our links. Please see our detailed guide here.

Follow us on:

Google News

Hackers Might Exploit Bug in Amazon Kindle and Company Issues Fix

Meet the voice behind Indo-Asian News Service (IANS), a storyteller navigating the currents of global events with precision and depth. Crafting narratives that bridge cultures, IANS brings you the pulse of the world in every word

Join the Opinion Leaders Network

Join the Techgenyz Opinion Leaders Network today and become part of a vibrant community of change-makers. Together, we can create a brighter future by shaping opinions, driving conversations, and transforming ideas into reality.

A team of cyber-security researchers has discovered security flaws in the popular e-reading device Amazon Kindle that might have led hackers to take full control of a Kindle device, opening a path to stealing information stored.

By tricking victims into opening a malicious e-book, a threat actor could have leveraged the flaws to target specific demographics and take full control of a Kindle device, according to a Check Point Research (CPR) team.

The researchers disclosed their findings to Amazon, and the company deployed a fix via a Kindle’s firmware update in April this year. The patched firmware installs automatically on devices connected to the Internet.

“By sending Kindle users a single malicious e-book, a threat actor could have stolen any information stored on the device, from Amazon account credentials to billing information,” said Yaniv Balmas, Head of Cyber Research at Check Point Software.

Kindle, like other IoT devices, are often thought of as innocuous and disregarded as security risks.

“But our research demonstrates that any electronic device, at the end of the day, is some form of computer. And as such, these IoT devices are vulnerable to the same attacks as computers,” he added.

The exploitation involves sending a malicious e-book to a victim.

Once the e-book is delivered, the victim simply needs to open it to start the exploit chain.

No other indication or interactions are required on behalf of the victim to execute the exploitation.

The team proved that an e-book could have been used as malware against Kindle, leading to a range of consequences.

For example, an attacker could delete a user’s e-books, or convert the Kindle into a malicious bot, enabling them to attack other devices in the user’s local network.

“Amazon was cooperative throughout our coordinated disclosure process, and we’re glad they deployed a patch for these security issues,” the CPR team noted.


Partner With Us

Digital advertising offers a way for your business to reach out and make much-needed connections with your audience in a meaningful way. Advertising on Techgenyz will help you build brand awareness, increase website traffic, generate qualified leads, and grow your business.

Power Your Business

Solutions you need to super charge your business and drive growth

More from this topic