Amazon Kindle security flaws could have let hackers hijack your device

Man reading on Kindle
(Image credit: Amazon)

Security researchers from Check Point Research (CPR) have discovered security flaws in Amazon Kindle that could allow an attacker to obtain information stored on user devices if exploited.

In order to exploit these flaws in the world's most popular e-reader, an attacker would need to send a malicious e-book to a victim. Once this e-book has been delivered to a user's device, a potential victim simply needs to open it to start the exploit chain as no other user interaction is required.

During its testing, CPR demonstrated that an e-book could be used as malware on an Amazon Kindle which would allow an attacker to delete a user's e-book library or convert their device into a malicious bot enabling them to attack other devices on a user's local network.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

Additionally an attacker could potentially steal a Kindle's Amazon device token or other sensitive information stored on a user's e-reader.

Targeting a very specific audience

As the security flaws discovered by CPR use malicious e-books as an attack vector, a threat actor could target a very specific audience when launching their attacks.

For instance, if an attacker wanted to target a specific group of people or demographic, they could easily select a popular e-book in the correlating language or dialect to orchestrate a highly targeted cyber attack.

Thankfully though, CPR disclosed its findings to Amazon back in February and the ecommerce giant deployed a fix in April with the release of version 5.13.5 of the Kindle's firmware which installs automatically on all devices connected to the internet.

Head of cyber research at Check Point Software, Yaniv Balmas warned in a press release that Amazon Kindle as well as all IoT devices are just as vulnerable to cyberattacks as smartphones and computers, saying:

“We found vulnerabilities in Kindle that would have allowed an attacker to take full control of the device. By sending Kindle users a single malicious e-book, a threat actor could have stolen any information stored on the device, from Amazon account credentials to billing information. Kindle, like other IoT devices, are often thought of as innocuous and disregarded as security risks. But our research demonstrates that any electronic device, at the end of the day, is some form of computer. And as such, these IoT devices are vulnerable to the same attacks as computers. Everyone should be aware of the cyber risks in using anything connected to the computer, especially something as ubiquitous as Amazon’s Kindle.”

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
A person holding a virtual cloud in the palm of their hand.
Amazon EC2 instances could be under fire from whoAMI technique giving hackers code execution access
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Thousands of WordPress websites hit in new malware attack, here's what we know
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
Bluetooth
Top Bluetooth chip security flaw could put a billion devices at risk worldwide
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)