Saturday, July 20, 2024

Beware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions

Newly spreading PayPal Phishing Attack Tricking the user into verifying the Transactions details via Email medium and it looks like a completely legitimate email that comes Originally from PayPal but it’s not actually original PayPal Notification.

Spam and Phishing scammers are using very advanced techniques to fool user through many social engineering techniques and day by day victims ratio are dramatically increased around the world.

In this case, Completely fake PayPal emails going around right now claiming to victims that your transaction can’t be verified and you payment process cannot be completed.

A Phishing email comes with Spoofed Email ID that claims that mail coming from [email protected]

[New Transaction Statements] we’re letting you know : We couldn’t verify your recent transactions
[New Activity Statements] [Account Hold] Re : Your payments processed cannot completed

Click the image to enlarge

Email body Contains the information that claimed some urgent unusual activities occurred in your account and following information are mentioned along with this body of the Email.

We couldn’t verify your recent transaction Dear Client,We just wanted to confirm that you’ve changed your password. If you didn’t make this change, please check information in here. It’s important that you let us know because it helps us prevent unauthorised persons from accessing the PayPal network and your account information.
We’ve noticed some changes to your unusual selling activities and will need some more information about your recent sales.

Verify Information Now

Click the image to enlarge

Once victims click the information, it will redirect to fake PayPal page which tries very hard to direct them to a “resolution center.” URL: my accounts-webapps-verify-updated informations(dot)epauypal(dot)com/myaccount/e6abe

Click the image to enlarge

Later, it redirects to two page where it asks victims to enter the personal information.

The first page asks the information about Name, street address, city, state, zip, country, phone number, mother’s maiden name, and date of birth.

The second page asks some more sensitive information’s Such as  Credit card information (name, number, expiration code, security code)

According to Malwarebytes, anyone submitting their information to this scam will have more to worry about than a fictional declined payment, and may well wander into the land of multiple actual not-declined-at-all payments instead.

Read here for common defense to check “Is it a Legitimate Website: How to Check if a Website is Safe.


Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles