Attention, new PayPal phishing! (Short message)

Earlier this month I pointed out a phishing email sent on behalf of PayPal. in the corresponding contribution I also showed you how to expose the mail as a fraud and that you should not perform any of the interactions requested in it and also not transmit any data. The same now applies to the follow-up mail that is currently being sent. The first e-mail (or with "... last year we informed you about it ...“Referring to a non-existent message). 

The following picture shows the mail that was received at the beginning of the month.

Did you receive an email from PayPal Customer Service at the beginning of 2020 with the subject "Your action is required" on the subject of "Directive 2015/2366 (PSD2)"? Then DO NOT click on the link in it!

Did you receive an email from PayPal Customer Service at the beginning of 2020 with the subject "Your action is required" on the subject of "Directive 2015/2366 (PSD2)"? Then DO NOT click on the link in it!

Since the same information on recognizing the attempt to steal data applies to the new fraudulent mail as to the first message, I will not go into further detail here and refer to the above-linked article from January 6, 2020 as well as the integrated graphic. Do you want to check whether "Your account is currently in restricted mode."Is correct, then sign up for PayPal aside from the links in the mail (on the Original page or in the app) and see if there are any restrictions. Spoiler: Probably not so;)

Self-check whether your own data has been stolen

Even if you are not a victim of Phishing has become, it is possible that your own access data was stolen from a service provider's server during one of the many hacker attacks. In order to offer a public examination, the website haveibeenpwned.com introduced, which checks after entering its own email address whether it is contained in one of the stolen databases.

If you get a hit here, it is advisable to change your access data. These databases are usually sold with the entire access data via hacker portals and sooner or later end up in the - even more wrong - hands.

-
Did you like the article and did the instructions on the blog help you? Then I would be happy if you the blog via a Steady Membership or at Patreon would support.

Leave a Comment

Your e-mail address will not be published. Required fields are marked with * marked