{"id":53493,"date":"2025-05-26T12:08:20","date_gmt":"2025-05-26T16:08:20","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53493"},"modified":"2025-05-26T12:08:20","modified_gmt":"2025-05-26T16:08:20","slug":"microsoft-365-purchase-email-scam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/53493\/","title":{"rendered":"Scammers exploiting Microsoft business notifications to launch attacks"},"content":{"rendered":"<p>For an email attack to succeed, the first thing cybercriminals need to do is get their messages in front of potential victims. In a recent <a href=\"https:\/\/www.kaspersky.com\/blog\/getshared-scam-emails\/53288\/\" target=\"_blank\" rel=\"noopener nofollow\">post<\/a>, we covered how scammers leveraged notifications from GetShared \u2014 a fully legitimate service for sharing large files. Today, we examine another method for delivering malicious emails. The operators behind this scam have learned to insert custom text into genuine thank-you messages sent by Microsoft 365 to its new business subscribers.<\/p>\n<h2>A genuine Microsoft email with a nasty surprise inside<\/h2>\n<p>The attack kicks off with a legitimate email in which Microsoft thanks the recipient for purchasing a <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/business\/microsoft-365-apps-for-business\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft 365 Apps for Business<\/a> subscription. The email does, in fact, arrive from the Redmond tech giant\u2019s legitimate address: microsoft-noreply@microsoft.com. One would be hard-pressed to imagine an email address with a more trusted reputation, so the message easily gets past any email server filters.<\/p>\n<p>One more time, just so we\u2019re clear: this is an honest-to-goodness email from Microsoft. The contents match a typical purchase confirmation. In the screenshot below, the company thanks the recipient for buying 55 Microsoft 365 Apps for Business subscriptions worth a total of $587.95.<\/p>\n<div id=\"attachment_53494\" style=\"width: 941px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/26120015\/microsoft-365-purchase-email-scam-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53494\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/26120015\/microsoft-365-purchase-email-scam-1.png\" alt=\"Scam leveraging genuine Microsoft notifications\" width=\"931\" height=\"726\" class=\"size-full wp-image-53494\"><\/a><p id=\"caption-attachment-53494\" class=\"wp-caption-text\">Example of a Microsoft business notification where attackers inserted their message in the Billing information section<\/p><\/div>\n<p>The crux of the scam lies in the text attackers add to the Billing information section. Typically, this section contains the subscriber company\u2019s name and the billing address. However, the scammers swap out that information for their own phone number, plus a note encouraging the recipient to call \u201cMicrosoft\u201d if they need any assistance. The types of \u201cpurchased\u201d subscriptions suggest that the scammers are targeting company employees.<\/p>\n<p>They prey on a common employee fear: making an expensive, unnecessary purchase could cause trouble at work. And since resolving the issue by email isn\u2019t an option (the message comes from a no-reply address), the victim is left with little choice but to call the phone number provided.<\/p>\n<h2>Who answers the calls, and what happens next?<\/h2>\n<p>If the victim takes the bait and decides to call to inquire about the subscriptions they\u2019ve supposedly purchased, the scammers deploy <a href=\"https:\/\/www.kaspersky.com\/blog\/social-engineering-tricks\/48539\/\" target=\"_blank\" rel=\"noopener nofollow\">social engineering<\/a> tricks.<\/p>\n<p>A Reddit user, who\u2019d received a similar email and called the number, <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/1f477c8\/comment\/llo7b87\/\" target=\"_blank\" rel=\"nofollow noopener\">shared their experience<\/a>. According to the victim, the person who answered the call insisted on installing some support software, and sent an EXE file. The subsequent conversation suggests that the file contained a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-access-trojan-rat\/\" target=\"_blank\" rel=\"noopener\">RAT<\/a> of some kind.<\/p>\n<p>The victim didn\u2019t suspect anything was amiss until the scammer promised to refund money to their bank account. That was a red flag, as they shouldn\u2019t have had access to the victim\u2019s banking details. The scammer went on to ask the victim to sign in to their online banking to check if the transaction had gone through.<\/p>\n<p>The victim believes that the software installed on their computer was malware that would have allowed the attackers to intercept their login credentials. Fortunately, they recognized the danger early enough and hung up. Within the same thread, other Reddit users reported <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/1f477c8\/real_microsoft_365_subscription_order_email_fake\/\" target=\"_blank\" rel=\"nofollow noopener\">similar emails<\/a> containing various contact details.<\/p>\n<h2>How scammers send phishing emails from a genuine Microsoft address<\/h2>\n<p>How, exactly, the attackers manage to send Microsoft notifications to their victims is still something of a mystery. The most plausible <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/1f477c8\/comment\/lkjuj6s\/\" target=\"_blank\" rel=\"nofollow noopener\">explanation<\/a> came from another Reddit user, who suggested that the scam operators were using stolen credentials or trial versions to access Microsoft 365. By using BCC or simply entering the victim\u2019s email address when purchasing a subscription, they can send messages like the one shown in the screenshot above.<\/p>\n<p>An alternative theory is that the scammers gain access to an account with an active Microsoft 365 subscription and then use the billing-information resend feature \u2014 specifying the target user as the recipient.<\/p>\n<p>Whichever is true, the attackers\u2019 goal is to replace the billing information \u2014 the only part of the Microsoft notification they can alter \u2014 with their own phone number.<\/p>\n<h2>How to protect yourself against such attacks<\/h2>\n<p>Malicious actors keep finding new loopholes in well-known, perfectly legitimate services to use for phishing campaigns and scams. That\u2019s why, to keep an organization secure, you need not only technical protections but also administrative controls. Here\u2019s what we recommend:<\/p>\n<ul>\n<li>Train your employees to spot potential threats early. This process can be automated with an e-learning tool like <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.com\/next?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____a8c0f733e524af27\" target=\"_blank\" rel=\"noopener nofollow\">robust security solution<\/a> on every corporate device to fend off spyware, remote access Trojans, and other malware.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.<\/p>\n","protected":false},"author":2598,"featured_media":53495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[76],"class_list":{"0":"post-53493","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-phishing"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/53493\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/microsoft-365-purchase-email-scam\/28898\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/24122\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/microsoft-365-purchase-email-scam\/29000\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/28163\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/microsoft-365-purchase-email-scam\/30982\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/microsoft-365-purchase-email-scam\/29692\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/microsoft-365-purchase-email-scam\/39571\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/microsoft-365-purchase-email-scam\/13404\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/microsoft-365-purchase-email-scam\/32238\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/microsoft-365-purchase-email-scam\/29164\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/microsoft-365-purchase-email-scam\/34939\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/microsoft-365-purchase-email-scam\/34570\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53493"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53493\/revisions"}],"predecessor-version":[{"id":53496,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53493\/revisions\/53496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53495"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}