Microsoft Subscription Expire Notice

Creation date: 6/17/2025 10:40 AM    Updated: 6/17/2025 10:40 AM   calendar invite microsoft subscription subscription
You notice a calendar invite for an expired Microsoft subscription. You don't recall adding it yourself or accepting the invite. This is a phishing email campaign that has the ability to bypass all current scanning tools. Simply delete the calendar invite and/or the email. Below are additional details from Mailguard.com.

What it looks like

The attack begins with an email purporting to come from “Microsoft Billing” (see image below), alerting the recipient that their Microsoft 365 subscription could not be renewed. A sense of urgency is created through the inclusion of an .ics calendar file that blocks out time in the victim’s schedule, pushing them to act quickly.

The phishing email presents itself as a failed Microsoft 365 subscription notice, urging action via attachments.


Also attached is an HTML file named to suggest it's a secure billing statement. When opened, this file launches a convincing imitation of Microsoft’s subscription payment portal (see images below).

A fake payment landing page asks users to confirm their billing, using a local HTML file, not a legitimate Microsoft domain.


Victims are prompted to enter their credit card and contact details under the guise of a $5.29 monthly billing form.


The flow includes a simulated "processing" screen and warning messages to increase urgency and credibility.


These steps mirror the tactics used in other advanced phishing campaigns, combining urgency, brand impersonation, and local HTML files to avoid detection.

🔒 But here’s the catch, everything about this setup is fake.
The email originates not from Microsoft, but from a compromised .shop domain, and the attachment is a phishing trap designed to steal:

  • Credit card details
  • Personal and corporate information
  • Email credentials

This is a credential harvesting and payment card fraud scam, carefully engineered to bypass common email filters and exploit trust in the Microsoft brand.


Why this scam is dangerous


  • Evades traditional filters using locally hosted attachments.
  • Exploits Microsoft branding to build trust.
  • Includes calendar events to psychologically drive urgency.
  • Targets personal and financial data, including business credentials.

Stay Safe - Know the Signs

MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.

Avoid emails that:

  • Aren’t addressed to you personally.
  • Are unexpected and urge immediate action.
  • Contain poor grammar or miss crucial identifying details.
  • Direct you to a suspicious URL that isn’t associated with the genuine company.