Sunday, June 15, 2025
HomeSecurity NewsBeware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions

Beware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions

Published on

SIEM as a Service

Follow Us on Google News

Newly spreading PayPal Phishing Attack Tricking the user into verifying the Transactions details via Email medium and it looks like a completely legitimate email that comes Originally from PayPal but it’s not actually original PayPal Notification.

Spam and Phishing scammers are using very advanced techniques to fool user through many social engineering techniques and day by day victims ratio are dramatically increased around the world.

In this case, Completely fake PayPal emails going around right now claiming to victims that your transaction can’t be verified and you payment process cannot be completed.

- Advertisement - Google News

A Phishing email comes with Spoofed Email ID that claims that mail coming from service@paypal.com

[New Transaction Statements] we’re letting you know : We couldn’t verify your recent transactions
[New Activity Statements] [Account Hold] Re : Your payments processed cannot completed

Click the image to enlarge

Email body Contains the information that claimed some urgent unusual activities occurred in your account and following information are mentioned along with this body of the Email.

We couldn’t verify your recent transaction Dear Client,We just wanted to confirm that you’ve changed your password. If you didn’t make this change, please check information in here. It’s important that you let us know because it helps us prevent unauthorised persons from accessing the PayPal network and your account information.
We’ve noticed some changes to your unusual selling activities and will need some more information about your recent sales.

Verify Information Now

Click the image to enlarge

Once victims click the information, it will redirect to fake PayPal page which tries very hard to direct them to a “resolution center.” URL: my accounts-webapps-verify-updated informations(dot)epauypal(dot)com/myaccount/e6abe

Click the image to enlarge

Later, it redirects to two page where it asks victims to enter the personal information.

The first page asks the information about Name, street address, city, state, zip, country, phone number, mother’s maiden name, and date of birth.

The second page asks some more sensitive information’s Such as  Credit card information (name, number, expiration code, security code)

According to Malwarebytes, anyone submitting their information to this scam will have more to worry about than a fictional declined payment, and may well wander into the land of multiple actual not-declined-at-all payments instead.

Read here for common defense to check “Is it a Legitimate Website: How to Check if a Website is Safe.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Don’t Click “Unsubscribe” links blindly It May Leads to Loss of Credentials

Imagine your inbox is overflowing with promotional emails—some from familiar companies, others less so....

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM

ConnectWise, a leading provider of remote management and cyber protection tools for managed service...

ESET Details on How to Manage Your Digital Footprint

ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital...