PayPal has been impacted by a credential stuffing attack that resulted in the compromise of data from 35,000 customers, reports SiliconAngle.
Threat actors targeted PayPal with the attack from Dec. 6 to Dec. 8, and were able to access customers' names, birthdates, addresses, Social Security numbers, and tax identification numbers, prior to the detection of malicious activity on Dec. 20. All impacted accounts have already been reset by PayPal.
"Although many PayPal accounts were affected, the attack was not the result of PayPals lack of security. Instead, its the result of PayPal users reusing the same password on PayPal and other websites," said Comparitech's Paul Bischoff.
Such an attack should prompt organizations to adopt stronger verification systems, according to Keeper Security Chief Technology Officer Craig Lurey.
"High-profile breaches must serve as a wakeup call for organizations large and small to implement a zero-trust architecture, enable [multi-factor authentication] and use strong and unique passwords," Lurey added.
As part of its latest attacks discovered in June, Tropic Tropper exploited several known Microsoft Exchange Server and Adobe ColdFusion vulnerabilities to distribute an updated China Chopper web shell on a server hosting the Umbraco open-source content management system.
More than 50 Alibaba-hosted command-and-control servers have been leveraged to facilitate the distribution of the backdoor, which impersonates the Java, bash, sshd, SQLite, and edr-agent utilities.
Angola and the Democratic Republic of Congo, which is a new Intellexa client, may have leveraged new Predator infrastructure to enable spyware staging and exploitation, according to an analysis from Recorded Future's Insikt Group.