Categories: Security

PayPal Phishing Attack Demands Selfie With Photo ID

Researchers have uncovered an unusually sophisticated phishing attack that targets PayPal users and attempts to obtain a photo of the target holding a bank card and photo ID.

The scam arrives as online services continue to tighten security requirements to protect users’ accounts or to crack down on fraudulent activities – making the attack appear all the more authentic.

ID scam

Like other online financial services providers, PayPal does, under some circumstances, ask users for additional proofs of identity, such as a photo of themselves taken from a mobile device or a photo ID.

The phishing scam appears to exploit this fact to obtain identification materials that researchers believe may be intended to help them launder money.

The scam asks users to submit a photo of themselves holding photo ID and a credit card

Like other phishing scams, this one begins with an authentic-looking email bearing the PayPal logo and address. It informs users their account has been suspended and asks them to click on a link to start an identity verification procedure.

The email contains odd grammatical uses and spelling errors, but otherwise appears genuine, researchers said.

The phishing website to which the user is directed also appears unusually authentic, compared to those employed by off-the-shelf phishing kits, according to PhishMe, which discovered the scam.

Hacked website

It’s hosted on a New Zealand domain that bears a message claiming it has been hacked by an individual called “Mr.Dr3awe”, with the phishing site buried in a subdirectory in order to evade anti-phishing scans.

After asking for users’ account information, name, address, credit card details and the like, the site moves on to the unusual step of asking the target to submit a “selfie” – a photo of themselves from a mobile device – holding a photo ID and payment card.

“If the victim is willing to hand over their phone and credit card numbers, could they possibly be willing to provide even more personal information?” wrote PhishMe’s Chase Sims in an advisory.

The photo is needed “presumably to create cryptocurrency accounts to launder money stolen from victims”, he wrote, noting that the phishing pages and their underlying code show an unusual level of professionalism.

Data exfiltration

The code “has input validations that most do not”, Sims wrote.

Following the photo upload the user is redirectected to the authentic PayPal site, potentially none the wiser that their identity information has been stolen, Sims said.

The data collected is sent to a Yandex email address tied to a Skype account under the name “Nazat Jou” of “Manzac, France”.

PhishMe recommended users to be wary of suspicious emails and not to follow links embedded in them.The company also provides simulation software that can be used to train individuals to spot and report such attacks.

Do you know all about security in 2017? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Alphabet Value Surges Over $2tn On Dividend Plan

Google parent Alphabet sees market capitalisation surge over $2tn on plan to over first-ever cash…

5 hours ago

Google Asks US Court To Dismiss Federal Adtech Case

Google asks Virginia federal court to dismiss case brought by US Justice Department and eight…

5 hours ago

Snap Sees Surge In Users, Ad Revenues

Snapchat parent Snap reports user growth, revenues in spite of tough competition, in what may…

6 hours ago

Intel Shares Sink As AI Surge Hits Chip Revenue

Intel shares sag after company shares gloomy revenue predictions, as data centre chip demand hit…

7 hours ago

Email Provider Complains To EU Over Reduced Google Rankings

Germany's Tuta Mail says Google broke EU's new DMA rules with March algorithm update that…

7 hours ago

US Regulator Probes Effectiveness Of Tesla Autopilot Recall

US auto safety regulator opens new investigation into adequacy of Tesla Autopilot recall, saying it…

8 hours ago