Scopeora News & Life ← Home
Technology

Beware of Phishing Scams Using Real Microsoft Email Addresses

Stay informed about the latest phishing scams that exploit real email addresses, including those from Microsoft, and learn how to protect your information effectively.

As fraudsters continue to exploit trusted brands, it is essential for users to be cautious of emails that may seem legitimate, even if they originate from a recognized company.

According to Ars Technica, a new phishing scheme has emerged that takes advantage of a Microsoft subscription feature, sending deceptive emails from the genuine address no-reply-powerbi@microsoft.com, which the company recommends users add to their safe sender lists.

Understanding the Microsoft Power BI Scam

Individuals targeted by this scam receive emails linked to Microsoft Power BI, a platform for business analytics. These messages often contain fake billing receipts with substantial charges from services like PayPal, Norton LifeLock, and Microsoft 365, along with a phone number for disputing the transaction.

Scammers on the other end may attempt to persuade victims to install remote access software, enabling them to take control of the device or extract personal information. Engaging with such phishing attempts--whether by calling the number, replying to the email, or clicking on links--can jeopardize both personal data and device security.

The emails typically showcase numerous typos and grammatical errors, alongside urgent calls to action that are often irrelevant to Microsoft. While many users might recognize these warning signs and delete the emails, fraudsters leverage the trust users have in the brands they impersonate, employing scare tactics to ensnare unsuspecting individuals.

This is not the first instance of such phishing schemes: fraudsters have previously sent malicious emails from legitimate PayPal and Google addresses by exploiting similar vulnerabilities. In the case of PayPal, fraudulent notifications were sent from service[at]paypal[dot]com using the platform's subscription billing feature. Similarly, scammers have registered subdomains under google.com through Google Sites and associated them with Google Accounts.