Tuesday, April 29, 2025
HomeCyber Security NewsPayPal Data Breach - Over 35,000 Users' Accounts Compromised

PayPal Data Breach – Over 35,000 Users’ Accounts Compromised

Published on

SIEM as a Service

Follow Us on Google News

PayPal has recently begun sending out notifications to thousands of users who were affected by a data breach. The breach occurred due to credential stuffing attacks, which allowed unauthorized access to user accounts. 

As a result of these attacks, some personal data may have been exposed. It is important for users to take the necessary steps to protect their information and monitor their accounts for any suspicious activity.

Credential stuffing is a type of cyber attack through which hackers try to gain unauthorized access to accounts by using the username and password pairs that have been obtained from data leaks on various websites. 

- Advertisement - Google News

This is done by automating the process of trying different combinations of login credentials on a specific website or service. These attacks are becoming increasingly common as more personal information is being shared online.

Through credential stuffing threats, actors specifically target users who employ the same password for multiple online accounts. This practice is commonly known as “password recycling” and it makes it easier for hackers to gain access to a user’s different accounts. 

This is particularly dangerous because once a hacker has access to one account, they can use that information to try and gain access to other accounts as well.

PayPal Data Breach

Between the 6th and 8th of December 2022, the credential stuffing attack occurred. At the time of the incident, the company discovered the problem and mitigated it, however, it also started investigating the way the hackers were able to gain access to the accounts and gained control them.

Upon concluding its investigation on December 20, 2022, PayPal confirmed that threat actors had used valid credentials to log into the accounts of its users.

It has been claimed that PayPal did not have a system breach and that no documents have been found that prove that attackers obtained user credentials directly from PayPal.

35,000 Users Affected

PayPal’s official data breach report claims that 34,942 of its customers were impacted by this data breach. It has been reported that hackers gained access to the following data during the two days:-

  • Full names
  • Dates of birth
  • Postal addresses
  • Social security numbers
  • Individual tax identification numbers
  • Transaction histories
  • Connected credit 
  • Connected debit card details
  • PayPal invoicing data

In response to the data breach that occurred on December 20, 2022, PayPal took swift action to limit intruders’ access to its platform and protect its customers’ information.

The company quickly identified the accounts that had been breached and took steps to reset the passwords of those accounts. 

This ensured that the unauthorized parties could no longer access the affected accounts and prevented them from gaining further access to sensitive personal information. 

Recommendations

By taking timely action, PayPal was able to minimize the damage caused by the breach and protect its customers from further harm. The company also continues to work on enhancing its security measures to prevent similar incidents from happening in the future.

Here below we have mentioned the security measures recommended by the company:-

  • If you are using the same username and password combination for any other accounts as for PayPal, then immediately update those passwords.
  • Immediately change the password and security questions on an account if you detect unusual activity on it, and notify the company about it.
  • Make sure to enable two-step verification in your Account Settings so as to add an extra level of security for your PayPal account.
  • Avoid clicking on URLs from unknown sources.
  • Do not open any email attachments that you received from unknown sources.
  • If you receive an email or a text message from PayPal asking for your password or login information or for any other authentication factors such as a one-time code then be sure to not provide any information, since PayPal never asks for this information.
  • You should visit PayPal.com separately to view any urgent messages if you are unsure or wish to verify their authenticity.
  • Messages that promote an immediate sense of urgency should also be taken into consideration.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...