PayPal closes loophole that let scammers send real emails with fake purchase notices
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是PayPal的一个漏洞被骗子利用,他们通过暂停订阅触发真实的邮件通知,然后用伪造的账户转发邮件,让邮件看起来像是来自PayPal的合法地址。这样他们就能绕过邮件过滤器,欺骗受害者。 接下来,骗子在邮件中提到自动支付被取消,并诱导受害者联系假的客服电话。受害者可能会被引导远程登录电脑,导致个人信息泄露或金钱损失。 PayPal已经关闭了这个漏洞,并建议用户保持警惕,使用官方渠道联系公司,不要随便点击可疑链接或拨打号码。同时提醒用户如果遇到诈骗,应该采取哪些措施。 总结的时候要简明扼要,包括漏洞、骗子手法、后果以及PayPal的应对措施。确保不超过100字,并且直接描述内容,不需要开头语。 </think> PayPal修复了一个安全漏洞,该漏洞曾被骗子滥用以发送看似来自[email protected]的钓鱼邮件。骗子通过暂停订阅触发真实的通知,并利用伪造账户转发邮件给大量目标。邮件声称自动支付被取消,并诱导受害者联系假客服电话以获取技术支持或取消支付。这些电话通常会引导受害者远程访问电脑或购买虚假软件服务,导致财务损失。PayPal建议用户提高警惕,并通过官方渠道核实信息。 2025-12-15 13:41:57 Author: www.malwarebytes.com(查看原文) 阅读量:6 收藏

After an investigation by BleepingComputer, PayPal closed a loophole that allowed scammers to send emails from the legitimate [email protected] email address.

Following reports from people who received emails claiming an automatic payment had been cancelled, BleepingComputer found that cybercriminals were abusing a PayPal feature that allows merchants to pause a customer’s subscription.

The scammers created a PayPal subscription and then paused it, which triggers PayPal’s genuine “Your automatic payment is no longer active” notification to the subscriber. They also set up a fake subscriber account, likely a Google Workspace mailing list, which automatically forwards any email it receives to all other group members.

This allowed the criminals to use a similar method to one we’ve described before, but this time with the legitimate [email protected] address as the sender, bypassing email filters and a first casual check by the recipient.

automatic payment no longer active
Image courtesy of BleepingComputer

“Your automatic payment is no longer active

You’ll need to contact Sony U.S.A. for more details or to reactivate your automatic payments. Here are the details:”

BleepingComputer says there are slight variations in formating and phone numbers to call, but in essence they are all based on this method.

To create urgency, the scammers made the emails look as though the target had been charged for some high-end, expensive device. They also added a fake “PayPal Support” phone number, encouraging targets to call in case if they wanted to cancel the payment of had questions

In this type of tech support scam, the target calls the listed number, and the “support agent” on the other end asks to remotely log in to their computer to check for supposed viruses. They might run a short program to open command prompts and folders, just to scare and distract the victim. Then they’ll ask to install another tool to “fix” things, which will search the computer for anything they can turn into money. Others will sell you fake protection software and bill you for their services. Either way, the result is the same: the victim loses money.

PayPal contacted BleepingComputer to let them know they were closing the loophole:

“We are actively mitigating this matter, and encourage people to always be vigilant online and mindful of unexpected messages. If customers suspect they are a target of a scam, we recommend they contact Customer Support directly through the PayPal app or our Contact page for assistance.”

How to stay safe

The best way to stay safe is to stay informed about the tricks scammers use. Learn to spot the red flags that almost always give away scams and phishing emails, and remember:

  • Use verified, official ways to contact companies. Don’t call numbers listed in suspicious emails or attachments.
  • Beware of someone wanting to connect to your computer remotely. One of the tech support scammer’s biggest weapons is their ability to connect remotely to their victims. If they do this, they essentially have total access to all of your files and folders.
  • Report suspicious emails. Send the email to [email protected] to support their investigations.

If you’ve already fallen victim to a tech support scam:

  • Paid the scammer? Contact your credit card company or bank and let them know what’s happened. You may also want to file a complaint with the FTC or contact your local law enforcement, depending on your region.
  • Shared a password? If you shared your password with a scammer, change it everywhere it’s used. Consider using a password manager and enable 2FA for important accounts.
  • Scan your system: If scammers had access to your system, they may have planted a backdoor so they can revisit whenever they feel like it. Malwarebytes can remove these and other software left behind by scammers.
  • Watch your accounts: Keep an eye out for unexpected payments or suspicious charges on your credit cards and bank accounts.
  • Be wary of suspicious emails. If you’ve fallen for one scam, they may target you again.

Pro tip: Malwarebytes Scam Guard recognized this email as a scam. Upload any suspicious text, emails, attachments and other files to ask for its opinion. It’s really very good at recognizing scams. Here’s what it reported back for this particular scam:

Scam guard result

Suspicious Email Assessment

This email appears to be a phishing attempt designed to trick you into contacting scammers via a fake customer service number, a suspicious website, or email address. Here’s a breakdown of key warning signs:

Red Flags Detected

  1. Fake or Spoofed Sender Address
    1. While it says “[email protected]”, sender addresses can be easily spoofed. The real test is the content and behavior of the message, not just the visible address.
  2. Suspicious URLs
    1. Links like http://sonyusa.store and [sonyusa.store] (both non-official and unrelated to PayPal or Sony).
    2. Official PayPal links always use paypal.com domain.
  3. Non-Official Customer Service Email
    1. Email provided is [email protected] instead of an official Sony or PayPal domain.
  4. Urgency and Threat of Unauthorized Charges
    1. Creates panic by telling you a large payment was processed and prompts you to act quickly by contacting their “support” number or email.
  5. Phone Number Trap
    1. The number provided (805-500-6377) is likely operated by scammers. Real PayPal will never ask you to contact them via generic phone numbers outside of their secure website.
  6. Unusual Formatting and Grammar
    1. Awkward phrasing and formatting errors are common in scams.”

We don’t just report on scams—we help detect them

Cybersecurity risks should never spread beyond a headline. If something looks dodgy to you, check if it’s a scam using Malwarebytes Scam Guard, a feature of our mobile protection products. Submit a screenshot, paste suspicious content, or share a text or phone number, and we’ll tell you if it’s a scam or legit. Download Malwarebytes Mobile Security for iOS or Android and try it today!

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2025/12/paypal-closes-loophole-that-let-scammers-send-real-emails-with-fake-purchase-notices
如有侵权请联系:admin#unsafe.sh