A new Phishing campaign takes place this time and targets its users PayPal. Hackers send phishing emails, which are supposed to be warnings for "unusual activity", and inform them users for suspicious links from unknown Appliances.
Her researchers ESEThowever, they found that phishers cheat users and make them give significantly data and credentials they use in the payment service.
The attackers place one malicious link in e-mail and trying to convince users to open it. From there they steal user data. To do so they try to scare the victims as much as possible so that they do not think about it and take immediate action. That is why they are told that the accounts they cannot be used until user authentication is confirmed. To confirm, users need to open the link in the email.
“Please log in to your PayPal account and complete the steps to confirm ID card your. "To protect your account, it will remain closed until you complete the necessary steps," says the phishing email.
"The security of your PayPal account is a top priority for us and we want to work together to protect it."
Authentication process
After the victim opens it phishing PayPal page, phishers will remind him again that unauthorized access to the account should be prevented. For this reason, victim is required to confirm 'information»By entering a password CAPTCHA that appears on the page.
According to ESET researchers, there are some data to help users understand that this is fraud. Initially, h sense of urgency, often associated with phishing campaigns, as hackers do not want to leave much space for victims to think. Other signs are strange URLThe incorrect use of the English language and use CAPTCHA.
The victims are then transferred to fake login pages that collect usernames and passwords access of PayPal.
Once connected, a page appears asking victims to verify their accounts by updating their information. This way they will be able to fully restore their accounts.
In the next steps, victims are asked to complete them their billing addresses (including their name, phone number, and date of birth). They also introduce credit and debit card details so they don't have to do this the next time they use Paypal.
To be sure, the attackers ask victims to confirm their credit and debit card information by entering them. their account numbers, password security on the back of the card and their mother's name.
In the last step, the victim is called to and provide his email password.
After all this is done, hackers send a message to the victims and congratulate them on successfully restoring their account.
According to the researchers, the attackers used many phishing domains with names that resembled the official PayPal site.
All phishing sites delivered via secure HTTPS connections, with the feature padlock, which increases user confidence and gives a sense of legitimacy.
"It is worth noting that we have not found any evidence that this campaign results in the installation of malware on the victims' machines," ESET added.
How to avoid phishing attacks?
- Do not open links from emails from unknown senders.
- If you open a link, check the site URL. Enter the URL of the site manually browser.
The PayPalalso provides some tips about finding phishing emails on his Help Center site and stresses that users should not reply to emails, click on embedded links or download and open attachmnets.
PayPal provides some tips to help you find phishing emails easier:
- Impersonal, general greetings are used, such as "Dear user" or "Dear [email address]"
- They ask you to click on links
- They contain unknown attachments
- They create a sense of urgency
- They are presented as warnings on serious issues
If someone has received a strange email that appears to be coming from PayPal, they should report it to spoof@paypal.com as soon as possible and delete it from their Inbox.