Thursday, December 26, 2024
HomeSecurity NewsBeware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions

Beware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions

Published on

SIEM as a Service

Newly spreading PayPal Phishing Attack Tricking the user into verifying the Transactions details via Email medium and it looks like a completely legitimate email that comes Originally from PayPal but it’s not actually original PayPal Notification.

Spam and Phishing scammers are using very advanced techniques to fool user through many social engineering techniques and day by day victims ratio are dramatically increased around the world.

In this case, Completely fake PayPal emails going around right now claiming to victims that your transaction can’t be verified and you payment process cannot be completed.

- Advertisement - SIEM as a Service

A Phishing email comes with Spoofed Email ID that claims that mail coming from service@paypal.com

[New Transaction Statements] we’re letting you know : We couldn’t verify your recent transactions
[New Activity Statements] [Account Hold] Re : Your payments processed cannot completed

Click the image to enlarge

Email body Contains the information that claimed some urgent unusual activities occurred in your account and following information are mentioned along with this body of the Email.

We couldn’t verify your recent transaction Dear Client,We just wanted to confirm that you’ve changed your password. If you didn’t make this change, please check information in here. It’s important that you let us know because it helps us prevent unauthorised persons from accessing the PayPal network and your account information.
We’ve noticed some changes to your unusual selling activities and will need some more information about your recent sales.

Verify Information Now

Click the image to enlarge

Once victims click the information, it will redirect to fake PayPal page which tries very hard to direct them to a “resolution center.” URL: my accounts-webapps-verify-updated informations(dot)epauypal(dot)com/myaccount/e6abe

Click the image to enlarge

Later, it redirects to two page where it asks victims to enter the personal information.

The first page asks the information about Name, street address, city, state, zip, country, phone number, mother’s maiden name, and date of birth.

The second page asks some more sensitive information’s Such as  Credit card information (name, number, expiration code, security code)

According to Malwarebytes, anyone submitting their information to this scam will have more to worry about than a fictional declined payment, and may well wander into the land of multiple actual not-declined-at-all payments instead.

Read here for common defense to check “Is it a Legitimate Website: How to Check if a Website is Safe.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...

USA Launched Cyber Attack on Chinese Technology Firms

The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a...