{"id":94798,"date":"2026-02-28T07:00:00","date_gmt":"2026-02-28T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=94798"},"modified":"2026-02-28T07:01:50","modified_gmt":"2026-02-28T04:01:50","slug":"paypal-leak-15-years-for-fake-ids-and-other-cybersecurity-developments","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/paypal-leak-15-years-for-fake-ids-and-other-cybersecurity-developments\/","title":{"rendered":"PayPal leak, 15 years for fake IDs, and other cybersecurity developments"},"content":{"rendered":"<p>We round up the week\u2019s key cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Four fraudulent call centres dismantled in Dnipro.<\/li>\n<li>Experts deem AI-generated passwords unsafe.<\/li>\n<li>Olympique de Marseille suffers a cyberattack.<\/li>\n<li>Ukrainian faces 15 years in prison for selling fake documents.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Four fraudulent call centres dismantled in Dnipro\u00a0<\/h2>\n<p>In Dnipro, law enforcement from Ukraine and the Baltic states dismantled a large-scale fraud scheme, the SBU press centre <a href=\"https:\/\/ssu.gov.ua\/novyny\/sbu-spilno-z-natspolitsiieiu-ta-pravookhorontsiamy-krain-baltii-vykryla-shakhraivkryptovaliutnykiv-yaki-obkradaly-hromadian-yes\">said<\/a>.\u00a0<\/p>\n<p>The ringleader and 10 accomplices were detained. Over the course of a year they defrauded EU citizens of at least $1.2 million. The suspects face up to 12 years in prison with confiscation of assets.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-beb1b532ddf21ece-7428922575345069-1024x682.png\" alt=\"image\" class=\"wp-image-275962\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-beb1b532ddf21ece-7428922575345069-1024x682.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-beb1b532ddf21ece-7428922575345069-300x200.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-beb1b532ddf21ece-7428922575345069-768x512.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-beb1b532ddf21ece-7428922575345069-1536x1023.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-beb1b532ddf21ece-7428922575345069.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: SBU.<\/figcaption><\/figure>\n<p>To run the scheme, the gang opened four call centres in Dnipro whose operators coaxed foreigners into investing in \u201cpromising\u201d crypto projects. They used a website that fully mimicked an exchange, showing victims fake charts of rising profits.<\/p>\n<p>According to law enforcement, to lull investors\u2019 suspicions the fraudsters initially paid out small real dividends. Victims then transferred larger sums to the scammers\u2019 crypto wallets.<\/p>\n<p>Once investments hit a certain threshold, the criminals cut off contact with victims and disappeared.<\/p>\n<h2 class=\"wp-block-heading\">Experts deem AI-generated passwords unsafe<\/h2>\n<p>Passwords generated by <span data-descr=\"large language model\" class=\"old_tooltip\">LLM<\/span>s can be cracked within hours. That was the conclusion of an experiment <a href=\"https:\/\/www.irregular.com\/publications\/vibe-password-generation\">conducted<\/a> by Irregular\u2019s researchers.<\/p>\n<p>The three models tested \u2014 Claude, ChatGPT and Gemini \u2014 create passwords based on persistent patterns that attackers can exploit.<\/p>\n<p>Researchers asked each LLM to create a 16-character password containing uppercase and lowercase letters, digits and special symbols, and repeated the task 50 times. They checked the results with popular password-strength services, which scored them highly because the systems do not track generation patterns.<\/p>\n<p>Of the 50 passwords, Claude produced only 30 unique ones. Two recurred, and 18 were exact duplicates. Most shared the same first and last characters. ChatGPT and Gemini showed similar results.<\/p>\n<p>While testing Google\u2019s Nano Banana Pro image-generation model, researchers asked it to produce a unique password written on a sticky note. They were able to identify Gemini\u2019s patterns.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"559\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-29672c51541ba074-7428922476580289-1024x559.png\" alt=\"image\" class=\"wp-image-275960\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-29672c51541ba074-7428922476580289-1024x559.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-29672c51541ba074-7428922476580289-300x164.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-29672c51541ba074-7428922476580289-768x419.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-29672c51541ba074-7428922476580289.png 1056w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Irregular.<\/figcaption><\/figure>\n<p>Irregular concluded that LLM-generated strings can be cracked within hours using simple software on old hardware. The patterns they found have already seeped into public repositories, as developers widely use AI-generated strings for protection in real projects.<\/p>\n<p>The researchers urged developers to change all AI-generated passwords and to use dedicated solutions and password managers instead.<\/p>\n<h2 class=\"wp-block-heading\">Olympique de Marseille hit by cyberattack<\/h2>\n<p>On 24 February, the management of French football club Olympique de Marseille <a href=\"https:\/\/www.om.fr\/en\/news\/4808\/club\/107873-official-statement\">confirmed<\/a> a cyberattack after a hacker claimed a breach earlier in the month.<\/p>\n<p>According to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/olympique-marseille-football-club-confirms-cyberattack-after-data-leak\/\">BleepingComputer<\/a>, the attacker posted a sample of allegedly stolen information on a hacking forum, claiming to have taken a database with details of club employees and fans.<\/p>\n<p>The club gave no details of the incident, but the hacker said the stolen database includes information on 400,000 people, including:<\/p>\n<ul class=\"wp-block-list\">\n<li>names and addresses;<\/li>\n<li>order information;<\/li>\n<li>email addresses;<\/li>\n<li>mobile phone numbers.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"697\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-644ece6379b8657d-7428922409223676-1024x697.png\" alt=\"image\" class=\"wp-image-275961\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-644ece6379b8657d-7428922409223676-1024x697.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-644ece6379b8657d-7428922409223676-300x204.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-644ece6379b8657d-7428922409223676-768x523.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-644ece6379b8657d-7428922409223676.png 1172w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: BleepingComputer.<\/figcaption><\/figure>\n<p>The attacker said the trove also contains data for more than 2,050 Drupal CMS accounts, including 34 club employees and 1,770 authors and moderators.<\/p>\n<h2 class=\"wp-block-heading\">Ukrainian faces 15 years for selling fake documents<\/h2>\n<p>Ukrainian national Yurii Nazarenko pleaded guilty to creating and running the OnlyFake website, the US Department of Justice <a href=\"https:\/\/www.justice.gov\/usao-sdny\/pr\/creator-onlyfake-charged-and-pleads-guilty-selling-more-10000-digital-fake\">said<\/a>.<\/p>\n<p>The platform used AI technologies to generate more than 10,000 realistic counterfeit IDs, including passports, driver\u2019s licences and US Social Security cards, as well as those of 56 other countries.\u00a0<\/p>\n<p>According to investigators, the service let customers customise the forgeries by choosing personal data or opting for random generation. Finished documents could appear as digital scans or photos on a table. Users\u2019 primary aim was to bypass <span data-descr=\"know your customer\" class=\"old_tooltip\">KYC<\/span> checks at banks and crypto exchanges to launder money.<\/p>\n<p>In 2024, undercover FBI agents bought fake passports and ID cards on the site. Nazarenko accepted payment only in cryptocurrency and offered bulk discounts for packages of up to 1,000 documents, attempting to hide transaction trails through a network of anonymous wallets.<\/p>\n<p>The defendant was extradited from Romania in September 2025. He faces up to 15 years in prison. Sentencing is set for 26 June 2026.<\/p>\n<h2 class=\"wp-block-heading\">PayPal discloses data leak caused by internal error<\/h2>\n<p>A software bug in PayPal Working Capital, the firm\u2019s small-business lending app, exposed users\u2019 confidential information, the company <a href=\"https:\/\/www.documentcloud.org\/documents\/27345193-paypal-february-2026-breach-notification\/\">said<\/a>.<\/p>\n<p>According to the notice, the leak began on 1 July 2025 but was discovered only on 12 December. The compromised data included:<\/p>\n<ul class=\"wp-block-list\">\n<li>names and email addresses;<\/li>\n<li>phone numbers and work addresses;<\/li>\n<li>Social Security numbers;<\/li>\n<li>dates of birth.<\/li>\n<\/ul>\n<p>The fintech giant said it rolled back the code change that caused the issue, blocking access to the data the day after the bug was found. PayPal also recorded unauthorised transactions on some customers\u2019 accounts and has reimbursed those affected.<\/p>\n<p>The company reminded users it never asks for passwords or one-time codes by phone, SMS or email. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/paypal-discloses-data-breach-exposing-users-personal-information\/\">According to<\/a> a PayPal spokesperson, around 100 customers were affected.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>An AI audit <a href=\"https:\/\/forklog.com\/en\/news\/ai-audit-uncovers-critical-bug-in-ethereum-client\">found<\/a> a critical bug in an Ethereum client.<\/li>\n<li>Binance\u2019s leadership denied allegations of $1.7bn in transfers to Iranian entities.<\/li>\n<li>ZachXBT <a href=\"https:\/\/forklog.com\/en\/news\/zachxbt-accuses-axiom-employee-of-insider-trading\">accused<\/a> an Axiom employee of insider trading.<\/li>\n<li>OpenClaw\u2019s AI agent <a href=\"https:\/\/forklog.com\/en\/news\/openclaw-ai-agent-runs-amok-deletes-meta-researchers-emails\">went rogue<\/a> and deleted a Meta researcher\u2019s email.<\/li>\n<li>Anthropic <a href=\"https:\/\/forklog.com\/en\/news\/anthropic-accuses-chinese-ai-labs-of-data-theft\">accused<\/a> Chinese AI labs of \u2018stealing\u2019 data.<\/li>\n<li>Terra representatives <a href=\"https:\/\/forklog.com\/en\/news\/terra-representatives-accuse-jane-street-of-ecosystem-collapse\">blamed<\/a> Jane Street for the ecosystem\u2019s collapse.<\/li>\n<li>An OpenAI employee\u2019s AI bot accidentally <a href=\"https:\/\/forklog.com\/en\/news\/openai-employees-ai-bot-accidentally-donates-to-tetanus-treatment\">donated<\/a> \u2018for tetanus treatment\u2019.<\/li>\n<li>Opinion: transaction simulation <a href=\"https:\/\/forklog.com\/en\/news\/vitalik-buterin-advocates-for-transaction-simulation-to-enhance-crypto-wallet-security\">will help<\/a> protect crypto wallets.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Weekend reading<\/h2>\n<p>In a new feature, ForkLog explores how the philosophical concept of biopolitics plays out in blockchain networks, why metaverses want users\u2019 biological data, and the risks of trading one\u2019s genome.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We round up the week\u2019s key cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":94799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"This week\u2019s key cybersecurity news.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-94798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"195","promo_type":"1","layout_type":"1","short_excerpt":"This week\u2019s key cybersecurity news.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=94798"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94798\/revisions"}],"predecessor-version":[{"id":94800,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94798\/revisions\/94800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/94799"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=94798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=94798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=94798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}