25 February 2020

PayPal customers hit with fraudulent charges via Google Pay


PayPal customers hit with fraudulent charges via Google Pay

Since last week multiple PayPal users have been baffled by mysterious charges on their PayPal accounts linked via GooglePay. Issues have been reported on numerous platforms including PayPal's and Google Pay’s support forums, Reddit, and Twitter.

Victims report that their Google Pay accounts are being used to make unauthorized purchases, with most of these transactions are being charged through US shopping stores, such as Target stores or Starbucks. The transactions range from €1,73 to over €1800 and, interestingly, the majority of victims appear to be from Germany.

Currently, it’s not clear what bug fraudsters are exploiting, but a security researcher known as 'iblue' tweeted that this issue appear to be similar to a bug reported to PayPal a year ago.

“Issue: PayPal allows contactless payments via Google Pay. If you have set it up, you can read the card details of a virtual credit card from the mobile, if the mobiles device is enabled. No auth. So basically anyone near your mobile phone has a virtual credit card which deducts money from your PayPal account. Its not limited in validity or amount,” the researcher said.

The researcher has told ZDNet that an attacker could obtain a virtual card's details via three methods: by reading the card details from a user's phone/screen; by infecting a user’s device with malware; or by brute-forcing it.

PayPal said that they are investigating the issue and that they would be refunding all affected users.

Back to the list

Latest Posts

Threat actors increasingly abusing Microsoft Graph

Threat actors increasingly abusing Microsoft Graph

Graph API is often used for discreet communications to cloud-based C&C servers.
6 May 2024
Marriott admits its systems were not encrypted before 2018 data breach

Marriott admits its systems were not encrypted before 2018 data breach

Marriott has acknowledged that it used SHA-1 algorithm, which does not qualify as encryption.
6 May 2024
Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany

Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany

The attacks targeted entities "related to Russia's war of aggression against Ukraine."
6 May 2024