PayPal Subscription Emails Abused in Fake Purchase Scam

Related

Zscaler Acquires Browser Security Firm SquareX to Embed Zero Trust Directly Into Web Browsers

What happened Cloud security provider Zscaler announced it has acquired...

CISA Orders Federal Agencies to Remove Unsupported Edge Devices to Curb Network Risk

  What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

Germany Warns of State-Linked Phishing Campaign Targeting Signal Users

What happened Germany’s Federal Office for the Protection of the...

Link11 Forecasts Top 5 Cybersecurity Trends Shaping European Defense Strategies in 2026

What happened European cybersecurity firm Link11 has released new analysis...

Share

What happened

Attackers are abusing PayPal’s subscription feature to send legitimate PayPal emails that appear to confirm real purchases. The messages list fake charges and prompt recipients to call a phone number controlled by the attacker, a tactic used to pressure victims into sharing information or authorizing payments.

Who is affected

Any PayPal user can receive these emails, including employees who use personal or corporate PayPal accounts. Finance teams, executives, and staff with payment access face higher risk due to their ability to approve or move funds.

Why CISOs should care

The emails are sent through PayPal’s own systems, which helps them bypass traditional email security controls. This increases exposure to voice phishing, account compromise, and payment fraud, even in environments with strong email filtering.

3 practical actions

  1. Instruct employees to verify PayPal activity by signing in directly to their PayPal account, not by calling numbers in emails.

  2. Expand phishing training to cover abuse of legitimate platforms and trusted brands.

  3. Monitor for social engineering attempts targeting finance and payment workflows and reinforce approval checks.