PayPal's Effective Response to a Security Incident

Posted date 17/03/2026

The security incident involving PayPal occurred between July and December 2025, although it was not detected until December 12. The information was not made public until late February 2026, when the first reports began to appear in cybersecurity media. The issue specifically affected its lending service, known as PayPal Working Capital, where a programming error allowed sensitive data to be exposed for several months. Unlike other security incidents, this was not a sophisticated external attack, but rather an internal system failure.

The breach led to the disclosure of personally identifiable information belonging to certain users, including highly sensitive data such as addresses, dates of birth, and Social Security numbers. According to the company’s statements, the number of affected users was relatively small, around a hundred customers, although the nature of the compromised information heightens the severity of the incident. This is the main reason why PayPal took the necessary measures, which included: immediately correcting the code error, directly notifying those affected, resetting login credentials, and offering credit monitoring services. The company also stated that it had reimbursed any unauthorized transactions detected.

The technical glitch has now been resolved, and there is no indication that the data breach is still active. However, this incident highlights the importance of internal controls and security audits in financial applications, even in the absence of external attacks.