A hacker using the handle Chucky_BF is offering a batch of 15.8 million email–password pairs linked to PayPal for sale on a Dark Web marketplace. The data, said to be complete with PayPal-specific URLs across web and mobile endpoints, is being sold for just $750.
According to Hackread, the data samples appear to contain credentials linked to Gmail accounts, including both PayPal’s web and Android login pages, suggesting the data was likely gathered via infostealer malware rather than a breach of PayPal systems.
Here’s a list of the data dump contents, according to the seller’s post:
If legitimate, this dataset can be used in large-scale credential-stuffing attacks, targeted phishing and fraud campaigns. PayPal has not confirmed any data breach. Credential abuse of this scale more commonly stems from malware on users’ devices, not the company’s systems.
Even if the authenticity of the data is uncertain, we recommend you safeguard your accounts and personally identifiable information by sticking to good cyberhygiene:
If you’re having trouble coming up with strong and unique passwords, you can use the Bitdefender Password Generator for free.
For users who may already be exposed in this or other breaches, Bitdefender Digital Identity Protection offers advanced monitoring and recovery support:
tags
Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.
View all postsMay 16, 2025