Chapter in this post:
Earlier this month I pointed out a phishing email sent on behalf of PayPal. in the corresponding contribution I also showed you how to expose the mail as a fraud and that you should not perform any of the interactions requested in it and also not transmit any data. The same now applies to the follow-up mail that is currently being sent. The first e-mail (or with "... last year we informed you about it ...“Referring to a non-existent message).
The following picture shows the mail that was received at the beginning of the month.
Since the same information on recognizing the attempt to steal data applies to the new fraudulent mail as to the first message, I will not go into further detail here and refer to the above-linked article from January 6, 2020 as well as the integrated graphic. Do you want to check whether "Your account is currently in restricted mode."Is correct, then sign up for PayPal aside from the links in the mail (on the Original page or in the app) and see if there are any restrictions. Spoiler: Probably not so;)
Even if you are not a victim of Phishing has become, it is possible that your own access data was stolen from a service provider's server during one of the many hacker attacks. In order to offer a public examination, the website haveibeenpwned.com introduced, which checks after entering its own email address whether it is contained in one of the stolen databases.
If you get a hit here, it is advisable to change your access data. These databases are usually sold with the entire access data via hacker portals and sooner or later end up in the - even more wrong - hands.
Jens has been running the blog since 2012. He appears as Sir Apfelot for his readers and helps them with problems of a technical nature. In his free time he drives electric unicycles, takes photos (preferably with his iPhone, of course), climbs around in the Hessian mountains or hikes with the family. His articles deal with Apple products, news from the world of drones or solutions for current bugs.