PayPal Breach Exposed PII of Nearly 35K Accounts

Practically 35,000 PayPal person accounts fell sufferer to a latest credential-stuffing assault that uncovered private information possible for use to gasoline extra, follow-on assaults.

PayPal submitted a breach disclosure that exposed that the assault started on Dec. 6, 2022 and continued till it was found on Dec. 20, 2002. Consequently, the names, addresses, Social Safety numbers, tax identification numbers, and/or dates of beginning for 34,942 customers have been uncovered.

“Now we have no info suggesting that any of your private info was misused because of this incident, or that there are any unauthorized transactions in your account,” PayPal defined in a letter despatched to affected customers. “There may be additionally no proof that your login credentials have been obtained from any PayPal programs.”

PayPal added that when the assault was found, account passwords have been reset, and extra safety controls have been put in place. The fee platform is providing Equifax identification theft monitoring for victims.

Stolen Credential Ecosystem

The credential-stuffing attack on PayPal was possible a means for menace actors to validate username and passwords that they had already obtained; now that they have been checked towards breached PayPal accounts, these verified credentials can be offered to a different menace actor, based on Jason Kent, hacker in residence with Cequence Safety.

“The worth within the record is that it’s verified,” Kent mentioned in an announcement supplied to Darkish Studying. “My guess is the usernames and passwords have been sourced by another breach that pointed to the opportunity of the accounts having PayPal entry.”

Password Reuse the True Perpetrator

Even the strongest, most advanced passwords cannot hold information safe in the event that they’re reused across accounts. The PayPal accounts may need been protected on this case in the event that they’d had distinctive passwords, famous Erich Kron, safety consciousness advocate at KnowBe4.

“That is what permits credential-stuffing assaults to be so profitable,” Kron mentioned in an announcement in regards to the incident. “Dangerous actors will take credentials scavenged from different information breaches and try to make use of them on different possible companies corresponding to banks, on-line procuring websites, social media, and on this case, on-line fee websites.”

Whereas a password supervisor is not a “silver bullet,” Kron added, it is an essential added layer of safety towards credential-stuffing assaults like that on PayPal.

“Remembering all of those passwords might be almost not possible; nonetheless, via using password managers which may generate and retailer utterly distinctive passwords, this may be achieved and not using a important quantity of effort,” Kron mentioned. “As well as, the appliance of multi-factor authentication might be very useful in these circumstances of account takeovers.”


Leave a Reply

Your email address will not be published. Required fields are marked *