Over the course of the last few days, we have seen an increase in the number of PayPal related Phishing emails. We suspect that cybercriminals are still trying to capitalize on the fear and worry that the recent Target data security breach instilled.
Below is an example on what these types of Phishing emails look like and how they operate if you were to get tricked into clicking one of them.
If a user would click on the embedded “Confirm” link, the link redirects the user to the phishing webpage:
After a successful log in, the site will post the users credentials and then redirects to the following webpage to get Credit card and Debit card information: hxxp://alert-paypal.com-id-4e5d5e9r8kg-info54d2...3502113454.u-pdate.38..350.geoman-gt.com/home/cfa1717d0....f5641/roo.php
Once this information is entered and you credit card information is posted, the user will be finally redirected to the legitimate Paypal site:
Thrityseven4 is actively updated for and protecting against this Phishing threat. The website below is blocked [hxxp://xfoodgourmet.com/xxx.php] as “Phishing & Fraud” under Web Security and in our Browsing Protection module.
“Delight yourself in the Lord and he will give you the desires of your heart.” Psalm 37:4