Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Hackers Claim Sale of 15.8M PayPal Logins

August 19, 2025
Reading Time: 3 mins read
in Incidents
iiNet Breach Exposes 280K Records

A threat actor named Chucky_BF is selling a massive data dump on a hacker forum, allegedly containing over 15.8 million PayPal logins, complete with email and plaintext password pairs. The data, which may be from infostealer malware logs, also includes specific PayPal URLs, making it a valuable tool for criminals.

A threat actor going by the name Chucky_BF is reportedly advertising a large PayPal data dump on a cybercrime forum. The cache, labeled “Global PayPal Credential Dump 2025,” claims to contain more than 15.8 million records of email and plaintext passwords. This significant data dump, at 1.1GB, is a collection of breached data from one system and is frequently associated with illegal activity after a data breach. The seller claims the data comes from various email providers and users globally. The leak’s severity lies not only in its size but also in the quality of the data, which includes URLs directly linked to PayPal services.

The nature of the data suggests it may have been collected using infostealer malware. This is a type of malicious software that infiltrates a computer system to secretly collect sensitive information, like login credentials, financial details, and browser history. The seller’s mention of specific endpoints like /signin, /signup, and /connect provides further evidence. This kind of detail is often found in logs from infostealers, which capture a user’s activity, including the URLs they visit while logging into a service. This structured data makes it easier for criminals to automate attacks, such as credential stuffing.

The data set is being marketed as a “goldmine for cybercriminals.” The records contain raw email, password, and URL combinations, which are ideal for automated attacks. The presence of URLs for sign-in and sign-up pages suggests the data could be used in credential stuffing attacks, where stolen login information from one breach is used to try and access a victim’s accounts on other websites. Because many users reuse passwords across multiple services, a single compromised password can grant a hacker access to multiple accounts. The data can also facilitate phishing schemes, a type of social engineering attack where bad actors masquerade as legitimate companies to trick people into revealing sensitive information.

A closer examination of the sample data provided by Chucky_BF revealed Gmail addresses paired with passwords and linked to PayPal’s login pages. This confirms that the data is structured to link specific credentials to PayPal. Additionally, some records showed the same account details used in both web and mobile versions of PayPal, highlighting the breadth of the compromised data. While the seller claims many of the passwords are strong, they also admit that many are reused, meaning that individuals who use the same password on other websites could be at risk. This underscores the importance of using unique passwords for all online accounts.

Chucky_BF is asking for $750 for the entire 1.1GB data dump, a price point in line with similar credential dumps on cybercrime markets. If the claims are true, this would be one of the largest PayPal-focused leaks in recent years, affecting millions of users across various email providers. The sale of such a large dataset poses a significant threat to global PayPal users, as it could lead to widespread credential stuffing, phishing campaigns, and other fraudulent activities. This incident serves as a stark reminder of the continuous threat of infostealer malware and the need for robust online security practices like using a password manager to generate and store unique passwords for every account.

Reference:

  • Threat Actor Claims to Sell 15.8 Million Plain Text PayPal Credentials Online
Tags: August 2025cyber incidentsCyber Incidents 2025Cyber threats
ADVERTISEMENT

Related Posts

Microsoft 365 Outage Hits Services

GitHub Copilot Chat Flaw Leaks Repo Data

October 10, 2025
Microsoft 365 Outage Hits Services

Crimson Collective Hits AWS Instances

October 10, 2025
Microsoft 365 Outage Hits Services

Microsoft 365 Outage Hits Services

October 10, 2025
BK Technologies Admits Cyber Breach

BK Technologies Admits Cyber Breach

October 10, 2025
BK Technologies Admits Cyber Breach

Dozens Hit in Oracle-Linked Hacks

October 10, 2025
BK Technologies Admits Cyber Breach

Chinese Hackers Hit Williams Connolly

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial