The attack begins with an email purporting to come from “Microsoft Billing” (see image below), alerting the recipient that their Microsoft 365 subscription could not be renewed. A sense of urgency is created through the inclusion of an .ics calendar file that blocks out time in the victim’s schedule, pushing them to act quickly.
The phishing email presents itself as a failed Microsoft 365 subscription notice, urging action via attachments.
Also attached is an HTML file named to suggest it's a secure billing statement. When opened, this file launches a convincing imitation of Microsoft’s subscription payment portal (see images below).
A fake payment landing page asks users to confirm their billing, using a local HTML file, not a legitimate Microsoft domain.
Victims are prompted to enter their credit card and contact details under the guise of a $5.29 monthly billing form.
The flow includes a simulated "processing" screen and warning messages to increase urgency and credibility.
These steps mirror the tactics used in other advanced phishing campaigns, combining urgency, brand impersonation, and local HTML files to avoid detection.
🔒 But here’s the catch, everything about this setup is fake.
The email originates not from Microsoft, but from a compromised .shop domain, and the attachment is a phishing trap designed to steal:
This is a credential harvesting and payment card fraud scam, carefully engineered to bypass common email filters and exploit trust in the Microsoft brand.
Stay Safe - Know the Signs
MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.
Avoid emails that: