PayPal Invoice Scams
PayPal Logo

PayPal Invoice Scams

Email spam filters are useful tools that prevent many scam emails from arriving in your inbox. Many users rely on spam filters to block phishing emails and, as a result, trust that emails sent to their inbox are legitimate. Cybercriminals take advantage of this trust by using legitimate websites like PayPal to send phishing emails and avoid spam filter detection.

In a recent scam, cybercriminals send you a fake invoice through a real PayPal account. Because emails from PayPal are not seen as spam, the email will probably be sent to your inbox rather than your spam folder. The email will look legitimate since it’s from a real Paypal account, but don’t be fooled. If you pay this invoice, you won’t get a valuable service. Your money will go to cybercriminals so they can use it for their own purposes!

To protect yourself from this malicious scam, follow the tips below:

  • Don’t rely on email spam filters to block phishing emails sent to you. Check emails for red flags like urgent deadlines and scare tactics to identify potential phishing scams.
  • To verify the legitimacy of an invoice, contact the service provider directly by using a known phone number or email address. Do not use the phone number or link sent in the invoice to contact the service provider.

Don’t trust the legitimacy of an email just because it was sent through a trusted website. Cybercriminals can use trusted websites to make their scams more believable.


Stop, Look, and Think. Don’t be fooled.

Protect your network! Learn more about security awareness training for your team.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Man Laptop Cybersecurity
Cybersecurity

SMB Cyber Targets

Majority of Cyber Incidents Now Target Small & Medium Businesses (SMBs) Cybercrime is a pervasive threat that affects individuals across all socioeconomic backgrounds, yet its

Doctor Hands Laptop Image
Ransomware

Unveiling the Human Element in Ransomware Attacks

In recent years, high-profile ransomware attacks have shaken industries and organizations worldwide. As technology advances, so do the tactics employed by threat actors. However, a

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs