SCAMMERS Hijack PayPal’s Own Email System!

Cybercriminals are now exploiting PayPal’s own email system to deliver convincing scams that evade detection and dupe users into giving up control of their devices and accounts.

At a Glance

  • Scammers send emails from PayPal’s real [email protected] domain
  • Messages include phone numbers instead of links to evade spam filters
  • Victims are persuaded to install remote access software via phone calls
  • PayPal’s system tools are being exploited to generate legitimate alerts
  • Users are advised to verify alerts by logging in directly, not via email

PayPal’s Platform Turned Against Its Users

A new wave of PayPal scams is exploiting the very system designed to protect its users. Attackers have managed to abuse PayPal’s own infrastructure—sending phishing emails from the official [email protected] address. This marks a significant shift in cybercrime methodology, where fraudsters no longer rely on easily detected spoofing techniques.

These emails are generated through PayPal’s legitimate tools, such as money requests or account change prompts. Because the alerts originate from PayPal’s verified infrastructure, they bypass traditional spam filters and pass all standard authentication checks. The deception lies in the psychological leverage created by the urgency and appearance of these emails—recipients are prompted to act quickly on what appear to be authentic financial alerts.

Watch now: 4 Your Money: Watch out for this PayPal phishing email scam

Social Engineering Through Phone Calls

The scam’s effectiveness hinges on a novel approach—there are no suspicious links. Instead, the emails include toll-free phone numbers purportedly connecting users to PayPal’s support team. When victims call, they are greeted by professional-sounding scammers posing as security agents. These impersonators instruct users to download remote access software, typically disguised as PayPal’s own security tools.

Once installed, these applications grant scammers full access to the user’s device. From there, they can steal credentials, initiate unauthorized transactions, or deploy malware. This move from URL-based phishing to social engineering via phone calls represents an alarming trend, as it circumvents nearly all digital threat detection tools currently in place.

A Breakdown in Trust and Detection

The scam’s success is rooted in a convergence of urgency, branding authenticity, and technical legitimacy. Recipients believe the messages are real because, in essence, they are—crafted and sent through official PayPal channels. This has left users as the final line of defense, without the usual warning signs that traditionally flag phishing attempts.

PayPal has responded by updating its security guidance and urging users to forward any suspicious communications to [email protected]. However, the company’s options are limited, as the attackers are exploiting system functionality rather than technical flaws. Security experts warn that this strategy could be replicated across other financial platforms, amplifying risks in digital communications.

Sources

Fox News

Chargebacks911

Norton

PayPal Security

PayPal Help