An Example of a PayPal Phishing Attack Found in the Wild
The “Click to Confirm” link redirected me to a legitimate-looking PayPal homepage that mimics their current website design.
Examining the structure of the target URL revealed a different domain – edmrevistas.com and not paypal.com.
Interestingly enough, some of the links on the copycat homepage point to the official PayPal website. For example, the “Buy” hyperlink points to the correct hxxps://www.paypal.com/webapps/mpp/how-paypal-works URL. By doing this, the cybercriminal is attempting to fool unsuspecting users that the site is legitimate. Like many other phishing emails, this attack’s intention is to trick you into handing over your PayPal account details, including a credit card number.
One way to check if there is problem with your account is to type the paypal.com URL directly into your web browser and log in as usual. If any legit security messages or account alerts exist, they will be clearly visible via the PayPal messaging system. Here is another example of a PayPal phishing email:
The hyperlinks in the email (image 3) redirect to the same, bogus hxxp://host25.griv.nl/WRBaAAmC/index.html URL, which is nothing more than a phishing website.
How Can You Spot Phishing Emails?
Here are five simple tips to avoid being defrauded by phishing emails:
- Check all hyperlinks within the email and verify that they point to the parent domain of the brand mentioned in the message. In this case, the hyperlinks should all be under the paypal.com domain.
- Be wary of sub-domains, such as site.paypal.com. While it is common of brands to utilize sub-domains for legit reasons, cybercriminals can also leverage them to conduct phishing attacks.
- If the email contents or the information being conveyed look suspicious, go directly to the site and login. Information regarding pending transactions or issues with your account is typically visible in your dashboard.
- If you receive a notification into an email address not registered to PayPal, it is probably a good idea to ignore it.
- When in doubt, STOP. THINK. CONNECT.™
Always check the URL to verify the domain, SSL, and more… Alternatively, try the zveloLIVE tool to check for malicious status.