Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Hackers Claim Sale of 15.8M PayPal Logins

August 19, 2025
Reading Time: 3 mins read
in Incidents
iiNet Breach Exposes 280K Records

A threat actor named Chucky_BF is selling a massive data dump on a hacker forum, allegedly containing over 15.8 million PayPal logins, complete with email and plaintext password pairs. The data, which may be from infostealer malware logs, also includes specific PayPal URLs, making it a valuable tool for criminals.

A threat actor going by the name Chucky_BF is reportedly advertising a large PayPal data dump on a cybercrime forum. The cache, labeled “Global PayPal Credential Dump 2025,” claims to contain more than 15.8 million records of email and plaintext passwords. This significant data dump, at 1.1GB, is a collection of breached data from one system and is frequently associated with illegal activity after a data breach. The seller claims the data comes from various email providers and users globally. The leak’s severity lies not only in its size but also in the quality of the data, which includes URLs directly linked to PayPal services.

The nature of the data suggests it may have been collected using infostealer malware. This is a type of malicious software that infiltrates a computer system to secretly collect sensitive information, like login credentials, financial details, and browser history. The seller’s mention of specific endpoints like /signin, /signup, and /connect provides further evidence. This kind of detail is often found in logs from infostealers, which capture a user’s activity, including the URLs they visit while logging into a service. This structured data makes it easier for criminals to automate attacks, such as credential stuffing.

The data set is being marketed as a “goldmine for cybercriminals.” The records contain raw email, password, and URL combinations, which are ideal for automated attacks. The presence of URLs for sign-in and sign-up pages suggests the data could be used in credential stuffing attacks, where stolen login information from one breach is used to try and access a victim’s accounts on other websites. Because many users reuse passwords across multiple services, a single compromised password can grant a hacker access to multiple accounts. The data can also facilitate phishing schemes, a type of social engineering attack where bad actors masquerade as legitimate companies to trick people into revealing sensitive information.

A closer examination of the sample data provided by Chucky_BF revealed Gmail addresses paired with passwords and linked to PayPal’s login pages. This confirms that the data is structured to link specific credentials to PayPal. Additionally, some records showed the same account details used in both web and mobile versions of PayPal, highlighting the breadth of the compromised data. While the seller claims many of the passwords are strong, they also admit that many are reused, meaning that individuals who use the same password on other websites could be at risk. This underscores the importance of using unique passwords for all online accounts.

Chucky_BF is asking for $750 for the entire 1.1GB data dump, a price point in line with similar credential dumps on cybercrime markets. If the claims are true, this would be one of the largest PayPal-focused leaks in recent years, affecting millions of users across various email providers. The sale of such a large dataset poses a significant threat to global PayPal users, as it could lead to widespread credential stuffing, phishing campaigns, and other fraudulent activities. This incident serves as a stark reminder of the continuous threat of infostealer malware and the need for robust online security practices like using a password manager to generate and store unique passwords for every account.

Reference:

  • Threat Actor Claims to Sell 15.8 Million Plain Text PayPal Credentials Online
Tags: August 2025cyber incidentsCyber Incidents 2025Cyber threats
ADVERTISEMENT

Related Posts

Dartmouth Confirms Major Data Breach

Canon Subsidiary Hit By Oracle Hack

November 25, 2025
Dartmouth Confirms Major Data Breach

Harvard Reports Significant Data Breach

November 25, 2025
Dartmouth Confirms Major Data Breach

Dartmouth Confirms Major Data Breach

November 25, 2025
Cox Confirms Oracle Hack As Victims Named

Delta Dental Virginia Breach Hits 146000

November 24, 2025
Cox Confirms Oracle Hack As Victims Named

Iberia Alerts Customers To Data Breach

November 24, 2025
Cox Confirms Oracle Hack As Victims Named

Cox Confirms Oracle Hack As Victims Named

November 24, 2025

Latest Alerts

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Subscribe to our newsletter

    Latest Incidents

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial