Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Hackers Claim Sale of 15.8M PayPal Logins

August 19, 2025
Reading Time: 3 mins read
in Incidents
iiNet Breach Exposes 280K Records

A threat actor named Chucky_BF is selling a massive data dump on a hacker forum, allegedly containing over 15.8 million PayPal logins, complete with email and plaintext password pairs. The data, which may be from infostealer malware logs, also includes specific PayPal URLs, making it a valuable tool for criminals.

A threat actor going by the name Chucky_BF is reportedly advertising a large PayPal data dump on a cybercrime forum. The cache, labeled “Global PayPal Credential Dump 2025,” claims to contain more than 15.8 million records of email and plaintext passwords. This significant data dump, at 1.1GB, is a collection of breached data from one system and is frequently associated with illegal activity after a data breach. The seller claims the data comes from various email providers and users globally. The leak’s severity lies not only in its size but also in the quality of the data, which includes URLs directly linked to PayPal services.

The nature of the data suggests it may have been collected using infostealer malware. This is a type of malicious software that infiltrates a computer system to secretly collect sensitive information, like login credentials, financial details, and browser history. The seller’s mention of specific endpoints like /signin, /signup, and /connect provides further evidence. This kind of detail is often found in logs from infostealers, which capture a user’s activity, including the URLs they visit while logging into a service. This structured data makes it easier for criminals to automate attacks, such as credential stuffing.

The data set is being marketed as a “goldmine for cybercriminals.” The records contain raw email, password, and URL combinations, which are ideal for automated attacks. The presence of URLs for sign-in and sign-up pages suggests the data could be used in credential stuffing attacks, where stolen login information from one breach is used to try and access a victim’s accounts on other websites. Because many users reuse passwords across multiple services, a single compromised password can grant a hacker access to multiple accounts. The data can also facilitate phishing schemes, a type of social engineering attack where bad actors masquerade as legitimate companies to trick people into revealing sensitive information.

A closer examination of the sample data provided by Chucky_BF revealed Gmail addresses paired with passwords and linked to PayPal’s login pages. This confirms that the data is structured to link specific credentials to PayPal. Additionally, some records showed the same account details used in both web and mobile versions of PayPal, highlighting the breadth of the compromised data. While the seller claims many of the passwords are strong, they also admit that many are reused, meaning that individuals who use the same password on other websites could be at risk. This underscores the importance of using unique passwords for all online accounts.

Chucky_BF is asking for $750 for the entire 1.1GB data dump, a price point in line with similar credential dumps on cybercrime markets. If the claims are true, this would be one of the largest PayPal-focused leaks in recent years, affecting millions of users across various email providers. The sale of such a large dataset poses a significant threat to global PayPal users, as it could lead to widespread credential stuffing, phishing campaigns, and other fraudulent activities. This incident serves as a stark reminder of the continuous threat of infostealer malware and the need for robust online security practices like using a password manager to generate and store unique passwords for every account.

Reference:

  • Threat Actor Claims to Sell 15.8 Million Plain Text PayPal Credentials Online
Tags: August 2025cyber incidentsCyber Incidents 2025Cyber threats
ADVERTISEMENT

Related Posts

Russian Hackers Hit Polish Hospitals

Russian Hackers Hit Polish Hospitals

September 19, 2025
Russian Hackers Hit Polish Hospitals

New York Blood Center Data Breach

September 19, 2025
Russian Hackers Hit Polish Hospitals

Tiffany Data Breach Hits Thousands

September 19, 2025
AI Forged Military IDs Used In Phishing

AI Forged Military IDs Used In Phishing

September 18, 2025
AI Forged Military IDs Used In Phishing

ShinyHunters Claims Salesforce Data Theft

September 18, 2025
AI Forged Military IDs Used In Phishing

Insight Partners Warns After Data Breach

September 18, 2025

Latest Alerts

Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

SEO Poisoning Hits Chinese Users

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

Subscribe to our newsletter

    Latest Incidents

    Russian Hackers Hit Polish Hospitals

    New York Blood Center Data Breach

    Tiffany Data Breach Hits Thousands

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial