PayPal Attack Warning—Dangerous Gmail Invoice Bypasses Email Security

Forbes - Mar 8th, 2025
Open on Forbes

A new phishing scam utilizing PayPal and Docusign has been uncovered by Malwarebytes researchers, highlighting how scammers are reverting to traditional methods to bypass advanced security measures. The scam involves setting up a fake Docusign account to send fraudulent invoices that appear legitimate and bypass email security filters. These emails, which seem to be from Docusign but use fake Gmail addresses, aim to steal user credentials by exploiting API weaknesses. PayPal and Docusign have issued warnings and guidelines to help users identify and avoid falling victim to such scams.

The resurgence of these traditional scams underscores the ongoing battle between cybersecurity advancements and criminal tactics. While companies like Google and PayPal enhance their security frameworks with AI-driven protections and improved login protocols, scammers adapt by exploiting familiar loopholes. This incident highlights the importance of user vigilance and the need for robust API monitoring and testing to prevent such breaches. Users are advised to independently verify suspicious communications and report any fraudulent activities to protect their accounts.

Story submitted by Fairstory

RATING

6.4
Moderately Fair
Read with skepticism

The article effectively addresses a timely and relevant issue of phishing scams using Docusign to target PayPal users. It provides clear explanations and practical advice, making it accessible to a general audience. However, its reliance on secondary sources without direct confirmation from key companies like Docusign and PayPal slightly undermines its accuracy and source quality. While it maintains a balanced and neutral tone, the inclusion of additional perspectives, especially from consumer protection agencies or affected users, would enhance its comprehensiveness. The article's potential impact lies in raising public awareness and encouraging safer online practices, although it is unlikely to provoke significant controversy. Overall, the piece is informative and relevant, with room for improvement in source verification and perspective diversity.

RATING DETAILS

7
Accuracy

The article presents a detailed narrative about a PayPal invoice scam exploiting Docusign's API, claiming these scams bypass email security filters. This claim is supported by statements from a malware intelligence researcher and a chief product officer, adding credibility. However, the article lacks direct confirmation from Docusign or PayPal regarding the exploitation of their systems, which would strengthen its accuracy. The mention of red flags, such as the use of Gmail addresses and non-existent recipient addresses, aligns with typical phishing characteristics, but these require further verification through external sources or documented examples. The factual basis is generally sound but would benefit from more direct evidence or statements from involved parties.

6
Balance

The article predominantly focuses on the perspective of security experts and companies like Malwarebytes and APIContext, which might skew the narrative towards a technical viewpoint. While it mentions Docusign's and PayPal's responses, it lacks a broader discussion on the implications for average users or insights from consumer protection agencies. This creates a slight imbalance, as the article could have expanded to include user experiences or additional viewpoints from cybersecurity analysts to provide a more rounded understanding of the issue.

8
Clarity

The article is well-structured and uses clear language, making it accessible to readers with varying levels of technical knowledge. It effectively explains the scam's mechanics and the steps users can take to protect themselves. The logical flow from problem identification to solution offers clarity, though it occasionally assumes a level of familiarity with technical terms that might not be present in all readers. Overall, the article maintains a neutral tone and presents information in a straightforward manner.

6
Source quality

The article cites Malwarebytes and APIContext as primary sources, which are credible entities in the cybersecurity field. However, it does not directly quote Docusign or PayPal, which are central to the story. Including statements from these companies would enhance the credibility of the information presented. The reliance on expert opinions is valuable, but the absence of direct statements from the affected organizations limits the depth of the source quality.

5
Transparency

The article provides some context about the scam's methodology and the importance of user vigilance, but it lacks transparency regarding the verification of claims. It does not disclose how the information was obtained or whether any attempts were made to contact Docusign or PayPal for comments. Greater transparency about the research process and potential biases in source selection would improve the article's transparency score.

Sources

  1. https://scamicide.com/2025/02/22/scam-of-the-day-february-23-2025-clever-paypal-phony-invoice-scam/
  2. https://beamstart.com/news/paypal-attack-warningdangerous-gmail-invoice-17414
  3. https://northpennnow.com/news/2025/feb/18/pa-attorney-general-warns-of-paypal-invoice-scam/
  4. https://www.attorneygeneral.gov/taking-action/attorney-general-sunday-warns-consumers-to-be-aware-of-trending-paypal-scam/
  5. https://www.malwarebytes.com/blog/news/2025/03/paypal-scam-abuses-docusign-api-to-spread-phishy-emails