Exposing the (518) 639-6243 Amazon Scam Call: How It Works and How to Stay Safe

Have you received a call from (518) 639-6243 claiming to be from Amazon, warning you about a $1,279.99 charge on your account? The automated message urges you to “press 1” to cancel the order. While this might sound alarming, it’s a sophisticated scam designed to steal your personal and financial information. This article delves into the details of this scam, how it operates, and what steps you should take if you’ve been targeted.

scam 4

Understanding the (518) 639-6243 Amazon Scam Call

The (518) 639-6243 scam call is a type of phishing attack where fraudsters impersonate Amazon representatives to deceive victims into revealing sensitive information. The call typically involves an automated voice alerting you to a significant charge on your Amazon account, often for an expensive item like an iPhone or MacBook. The message then prompts you to press a number to speak with a customer service representative.

Why This Scam Is Effective

Scammers exploit the trust and familiarity people have with Amazon. By creating a sense of urgency and fear, they prompt quick reactions without giving victims time to think critically. The use of specific details, like exact charge amounts and product names, adds a layer of credibility to the fraudulent call.

Common Tactics Used

  • Caller ID Spoofing: Scammers manipulate the caller ID to display a legitimate-looking number, such as (518) 639-6243, to increase the likelihood of the call being answered.
  • Automated Messages: The use of robocalls allows scammers to reach a large number of potential victims efficiently.
  • Urgent Language: Phrases like “unauthorized charge” or “press 1 to cancel” create panic, leading victims to act without verifying the information.
  • Impersonation of Authorities: In some cases, scammers may claim to be from law enforcement or financial institutions to add pressure and legitimacy to their claims.

How the Scam Operates

Understanding the mechanics of the scam can help you recognize and avoid falling victim to it.

Step 1: The Initial Call

You receive a call from (518) 639-6243 with an automated message stating:

“Hello, this is an important call from Amazon Customer Support. This is to notify you regarding your today’s purchase on Amazon.com. You have been charged $1,279.99 on your default card saved on Amazon.com. If you have not made any such transaction, then please press 1 to cancel your order.”

Step 2: Connecting to a “Representative”

Pressing the prompted number connects you to a live person posing as an Amazon customer service agent. They may use technical jargon and reference fake order numbers to appear legitimate.

Step 3: Requesting Personal Information

The fake representative may ask for:

  • Your full name and address
  • Amazon account details
  • Credit card or bank information
  • One-time passwords (OTPs) sent to your phone

They might claim this information is needed to verify your identity or cancel the fraudulent charge.

Step 4: Gaining Remote Access

In some instances, the scammer may instruct you to download remote access software like AnyDesk or TeamViewer, claiming it’s necessary to resolve the issue. This grants them full access to your device, allowing them to steal sensitive data or install malware.

Step 5: Financial Exploitation

Once they have your information, scammers can:

  • Make unauthorized purchases
  • Withdraw funds from your accounts
  • Commit identity theft
  • Sell your information on the dark web

What to Do If You’ve Been Targeted

If you suspect you’ve fallen victim to this scam, take immediate action to protect yourself.

1. Disconnect and Do Not Engage Further

If you’re still on the call, hang up immediately. Do not provide any personal information or follow any instructions given by the caller.

2. Secure Your Amazon Account

  • Change your Amazon password immediately.
  • Enable two-factor authentication for added security.
  • Review your account for any unauthorized orders or changes.

3. Contact Your Financial Institutions

  • Inform your bank and credit card companies about the potential breach.
  • Monitor your accounts for suspicious activity.
  • Consider placing a fraud alert on your credit reports.

4. Report the Incident

5. Scan Your Devices

If you downloaded any software at the scammer’s request, run a comprehensive antivirus and anti-malware scan on your devices.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

Preventative Measures: Staying Ahead of Scammers

Being proactive can help you avoid future scams.

Be Skeptical of Unsolicited Calls

Legitimate companies like Amazon will not call you unexpectedly to discuss account issues. Always verify such claims through official channels.

Do Not Share Personal Information

Never provide sensitive information over the phone unless you’re certain of the caller’s identity.

Use Call-Blocking Tools

Consider using call-blocking apps or services to reduce unwanted calls.

Educate Yourself and Others

Stay informed about common scams and share this knowledge with friends and family to help protect them.

Frequently Asked Questions (FAQ) About the (518) 639-6243 Amazon Scam Call

Is (518) 639-6243 a real Amazon phone number?

No, (518) 639-6243 is not a legitimate Amazon phone number. Amazon does not contact customers via unsolicited robocalls about suspicious purchases or charges. Any claim made by this number should be considered fraudulent.

What does the scam call say?

The call is an automated message claiming to be from Amazon Customer Support. It states that you have been charged $1,279.99 for a purchase and asks you to press a number to cancel or confirm the order. This is a scam intended to lure you into speaking with a fake representative.

What happens if I press 1?

Pressing 1 connects you to a scammer posing as an Amazon representative. They will attempt to gain your trust and then steal your personal information, access your computer or mobile device, or trick you into making a payment or giving away sensitive data.

Why do scammers use Amazon’s name?

Amazon is a widely recognized and trusted brand. Scammers use its name to create a false sense of legitimacy and urgency. By pretending to be from Amazon, they increase the chances of people taking the bait and following their instructions.

Can scammers really charge my Amazon account?

No, scammers cannot charge your Amazon account unless they have access to your login credentials or linked payment methods. If you did not authorize any charges and you suspect fraud, log in to your Amazon account directly and check your order history.

They asked for remote access to my device. Why?

Scammers often ask victims to install remote access software like AnyDesk or TeamViewer under the pretense of helping resolve an issue. In reality, this gives them full access to your device, allowing them to steal information, install malware, or make unauthorized financial transactions.

What should I do if I spoke to the scammer or followed their instructions?

Immediately disconnect the call and uninstall any software they asked you to download. Change your Amazon password and any other passwords you may have entered. Notify your bank or credit card company, and monitor your financial accounts for suspicious activity.

How do I report this scam?

You can report the scam to:

  • The Federal Trade Commission (FTC) at reportfraud.ftc.gov
  • Amazon directly at stop-spoofing@amazon.com
  • The Federal Communications Commission (FCC) at consumercomplaints.fcc.gov

Include the phone number, time of the call, and a description of what happened.

Will Amazon ever call me about account issues?

Amazon does not use unsolicited robocalls to notify customers of account issues or transactions. Any legitimate communication from Amazon will come through your secure account or official email. When in doubt, contact Amazon directly through their website.

How can I protect myself from phone scams like this?

Do not trust unsolicited calls that create urgency. Never provide personal or financial information over the phone unless you initiated the call to a verified number. Use caller ID blocking and call-filtering tools, and educate yourself about common scam tactics to stay informed.

The Bottom Line

The (518) 639-6243 Amazon scam call is a deceptive attempt to exploit trust in a well-known brand. By understanding how this scam operates and taking swift action if targeted, you can safeguard your personal and financial information. Always remain vigilant and verify any suspicious communications through official channels.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Leave a Comment

Previous

(606) 293-1675 Scam Alert: Fake Google Business Listing Calls Explained

Next

Lotto Cash AI Is a Scam – Here’s the Truth Behind the Fake Lottery System