The PayPal Phishing Email Message
Subject: We're investigating a paypal payment reversal ( Case ID #PP-582-123-479-017 )
From: PayPal Team (firstname.lastname@example.org) PayPaI
Notice of Policy Updates
Dear [email address],
security measure, we regularly screen activity in the system.
You received this message due to Invalid information in your account.
Please update your information promptly so that you can continue to enjoy all the benefits of your PayPaI account. If you don't update your information within 14 days, Your account will be Iimited.
We are sorry for the inconvenience, but we are working hard to maintain the confidentiality of your information.
Log in to update your account
If you follow the instruction in this scam, you will be taken to the following fake PayPal website and ask to sign-in with your PayPal username and password:
You will then be asked to update your credit card information by entering it on the bogus PayPal page.
All the information entered on the bogus PayPal page will be sent to the cybercriminals behind the scam. Once they have your PayPal credentials, they use it to hijack your account and use it for fraudulent purposes. This includes stealing money from your account, using your PayPal and credit card to make fraudulent purchases.
If you have already entered your PayPal user name, password and credit card information on the fake website, please change your PayPal password and contact your bank immediately.
Please note that PayPal will always address you by your name, and will never refer to you using the following:
- Dear [Email Address]
- Dear PayPal user
- Dear PayPal customer
- Dear Valued Customer
- Dear Member
- Dear User
- Dear Customer
To avoid getting tricked by these phishing scams, never click on a link in an email message to sign into your PayPal account. Always go to www.paypal.com and sign into your account from there. PayPal will display important messages or notifications to you once you have signed into your account.
This PayPal phishing scam is similar to the following: