There's a really disturbing #Paypal #phishing scam happening right now. Obviously this reads like a typical phishing attempt (bad grammar, a malformed phone number to call, etc), but the official Paypal email wasn't spoofed. It came from PayPal's email infrastructure.

Examining the headers shows that SPF, DKIM, and DMARC all pass. If you have a Paypal account, please exercise caution. Don't click links in these emails. Forward them to [email protected].

Please boost for visibility.

Thanks for the insights, everybody!
Wanted to share this because it looks JUST authentic enough to trick some people (e.g. my aunt or grandmother) into calling that number and giving out personal info.
@killyourfm that's quite the user/company name they picked.

@freaktechnik @killyourfm Almost makes you wonder if you could chose a username that would break havoc on their database. But then again, that would be their damage - not their customers'.

This approach supposedly is well known since a while, can't believe they don't want to implement some kind of sanity check - I mean this mouthful of a "username" ticks a ton of boxes.

@lunte161 @killyourfm while I'm normally very much in the camp of not limiting input unless there is a technical reason I think there is an argument that most names should be able to get by with fewer spaces and total characters... Having abbreviations of long names shouldn't be unexpected.

@killyourfm "ready to get coding" at the bottom is extremely interesting.

They are probably exploiting some invite developer system. The same way scammers were using Google calendar invites and google drive file share to send spam and scam messages.

And that's why it would come from a paypal official mail server.

@portaloffreedom @killyourfm The subject line has "invited you as a developer" in it too. So absolutely that.
@portaloffreedom @killyourfm Came here to say the same thing. I wonder if the "store name" is that whole string including the phone number and warning about deduction from your card/bank …
@XenoPhage @portaloffreedom @killyourfm That's exactly what it is. See the "invited you as a developer" at the end of the subject line. Unfortunately it's not a new technique (I remember reading someone's post on this exact exploit at least several months ago, possibly even longer) which means that PayPal still hasn't fixed it... (You'd think given the sheer amount of "someone put a banned word in the memo" automation they have that they could do something similar to trigger manual review of a store name...)
@becomethewaifu @portaloffreedom @killyourfm Plus the sheet length allowed as a store name.. Surely there’s a reasonable limit that can be added..
@killyourfm looks like what they did was send an invite with that entire message being their "name", i wonder if the broken phone number formatting is just a trivial way to get around detection of phone numbers in a name.
@raptor85 HA! I just noticed that. Rather hilarious that they're targeting people who should absolutely recognize this as a scam. But it looks just authentic enough to scare the crap out of people like... well, anyone in my family.
@killyourfm I'm guessing PayPal itself must have been subject to a social engineering or phishing attack then, and the attackers have managed to gain access to their infrastructure, which is rather worrying in of itself, especially when you consider how much money people sometimes store in PayPal.
@audaciousfurry @killyourfm if you look closely at the email title, you will see that this is "UserName invited you to join as a developer" for the PayPal software engineering platform. I expect any user can do that, and I suspect PayPal simply allows one to set their legal name to "Please send all your money to my bank account"
@audaciousfurry @killyourfm Look at the end of the subject line. The attacker set their display name to the phishing message so that mail about their account would include it, then induced PayPal's systems (by non-exploit means) to send notifications. As @efi says, it's ingenious.
@alilly @audaciousfurry @efi Downright nefarious! It's JUST enough to trick a few people...

@killyourfm @alilly @efi

And that's all they need. According to statistics, spam accounts for 45~73% of all email traffic as of 2025, with about ~14.5+ billion spam mail sent a day.

If we assume that only 1% are actually opened, and that of those opened, only 1% of those 1% are fallen for, that's still 1.45 million spam emails being fallen for a day. Thats 10.15 million a week, 43.5 million a month, or ~530 million a year. And the number is likely higher and will only continue to grow as technology advances, especially as technological literacy seems to be in decline.

These emails aren't made to target everyone, they're designed to be mass mailed in the hope that someone, even one person, clicks on them. Especially as now, spam and phishing is less about immediate theft of money and the more permanent theft of PII, Personally-Identifiable Information, that is to be sold on the Black Market for who knows how much.

And once you fall for even one, you're more likely to be targeted as they know you previously fell for one. And this doesn't even take into account Spear Phishing, which is more a social engineering attack, to craft an email designed to specifically target an individual or entity (such as a corporation or institution)

Data Source: https://againstdata.com/blog/email-spam-statistics

30 Email Spam Statistics to Know in 2025

Wondering how bad email spam has become in 2025? From daily volumes to phishing trends, here are 30 email spam statistics that might make you rethink your inbox.

@audaciousfurry @killyourfm @alilly add to that that some people are now using llms to summarize emails...

@killyourfm This has been going on for a while, and it generally involves Paypal business accounts that have been hijacked. They allow the ability to send invoices, which is basically what these messages are because they come through paypal.com.

https://krebsonsecurity.com/2022/08/paypal-phishing-scam-uses-invoices-sent-via-paypal/

PayPal Phishing Scam Uses Invoices Sent Via PayPal – Krebs on Security

@killyourfm What's funny is that when I reached out to PayPal about this in 2022, they said oh this nothing new. I said well it was new to me, but if it's not new to you guys how come it's still happening so much?

@briankrebs @killyourfm this one is a developer invitation, but it seems those are also limited to business accounts (or I couldn't find the button to invite people to my test app in the PayPal sandbox UI).

But it's quite pathetic that PayPal still can't solve this issue after knowing about it for years

@killyourfm I've gotten scam attempts sent as actual PayPal money requests, but with the "message" making it sound like something other than a "money request". Just blindly sent to tons of email addresses at once.

For the longest time, PayPal had no way to delete these from your "inbox"! Even after the offending account was deleted as fraud, the "money request" still appeared in my inbox. (I had dozens of them.)

@killyourfm

I just cancelled my PayPal account.

They asked for the reason, and I was tempted to answer "Peter Thiel and Elon Musk", but why should I treat them with any information at all.

@killyourfm Amusingly, I generally can't forward them to [email protected], because by the time it's seen them once and then I try to forward them, rspamd has already classified them as malicious.
@killyourfm @briankrebs I have been getting these for years at this point. The flaw in paypal’s infrastructure is pretty well known, and they don’t seem to care
@killyourfm multiple people have reported this abuse of their development platform to them including me and they don't care. Don't use PayPal.
@killyourfm for safety you should delete you PayPal account πŸ™„
@killyourfm I see other versions of this, like a PayPal invoice for a Zoom charge, coming from [email protected], passing DMARC etc. But the message body is leveraging Zoom Docs which emails out a fully rendered rich preview, with images and formatting all looking authentic.
@killyourfm that's ingenious, most people won't stop to read the full subject line
@killyourfm yes, I had an organization I work with forward made this and ask about it yesterday. It took me a minute to realize how they did it! Very clever.
@killyourfm Its the invite stuff. Due to PayPal's formatting of the emails it can easily be used for phishing, that's why the email is actually legitimate.
It's just inviting you, but what you are reading is the name.
PayPal should definitely change the design of their email, so it clearly states, that there is an invitation, and that the name of the group is the following: .
Would make it way more apparent it is scam.
@killyourfm this is a hilarious mistake on PayPal's part, allowing this much free text for an account's name. Any sort of email sent by their platform that contains user-supplied inputs like this should be considered risky for this exact reason. Gotta wonder how messed up their internal infrastructure must be if commits like this never pass the eyes of a security team, or if the security team didn't see the potential risk of allowing user freetext to be displayed in this manmer

@killyourfm
It's all just data and you can take data.

All you need is to take the header of a legit PayPal mail, and stick your own body to it and you're golden.

@killyourfm
> There's a really disturbing # Paypal

... I think this can be reducetd to half of the first sentence.

@killyourfm
It IS authentic. Paypal is just nuts to allow this to happen.
@killyourfm they spent all that time compromising paypals infra and couldnt be bothered to copyedit the email?
@killyourfm actually i see how they did this its really not that fancy
@killyourfm PayPal SPF is alot. Without seeing the headers i would bet this came from sendgrid. This SPF is like Matryoshka dolls.
@killyourfm also the big text is too long

@killyourfm

Looks like it's sending you an invite to access a dev API. The message looks to be inserted in the username field. I wonder if this a real (i.e. using legit PP infrastructure for its intended purpose) email sent by an attacker who entered the message as a user handle & invited you as a developer to some sort of PP enterprise API project they control.

@killyourfm Putting phishing scams in legitimate fields of a legitimate service is... well, let's just say I've spent more than a little of my time chasing people like this. It gnawed the hell out of our deliverability when scammers and spammers started to get this clever: scam stuffed into usernames, scam in the agreement names, scam in the PDF, scam basically anywhere users are allowed to fill out a field.

I ran a lot of relays and had to do a lot of RBL removal begging. Product didn't care to put real limits on free usersβ€”it'd eat into the funnelβ€”so the entire service was constantly being degraded because of phishers. It's amazing how much bare-handed manual work went into mopping up and bandaid-ing over bad product decisions that made us accomplices to scamming the public.

@killyourfm @luv4music1231 I got one of these. Weirdest-looking garbage I've seen. Didn't call the phone number, but did log into my paypal, where I did not find any unauthorized transactions.
@killyourfm Paypal Mafia = OG scammers.
@killyourfm … and this ongoing for months.