Email threatening to reveal private data from Microsoft may be a scam

The saying “when someone tells you who they are, believe them” doesn’t hold true in cyberspace, where hackers run rampant. Unfortunately, it’s easy for criminals to pretend to be someone else, and that’s exactly what’s happening with a new fake Microsoft email that’s been circulating. If you’ve received a message from Microsoft threatening to expose your private data, it’s probably a scam—even if it comes from a Microsoft account.

Why you shouldn't immediately trust a threatening email from Microsoft?

In the latest Microsoft scam, hackers exploited a vulnerability in the Microsoft 365 Admin Portal code to send emails from Microsoft.com accounts, so the messages didn't end up in recipients' spam folders.

Email threatening to reveal private data from Microsoft may be a scam

Although they may appear to be legitimate emails, these emails claim to contain sensitive images or videos of you in sensitive situations. To prevent this content from being shared, you must pay a ransom. In other words, these emails are intended to blackmail you.

Warning : When extortion scams are paired with sexually explicit or sexually explicit media content, this is often referred to as “sextortion.”

Warning signs to watch out for

Sadly, sextortion scams are becoming more common, prompting companies to introduce safeguards, like Instagram restricting the ability to delete photos. But for every safeguard, criminals will find a technical loophole. So we need to be able to take things seriously, in case tech companies fail.

Email threatening to reveal private data from Microsoft may be a scam

Of course, the first thing to check is the username or email address. In this example, the hacker exploited a vulnerability in the Microsoft 365 Message Center's "share" option, which is often used for legitimate service alerts. This makes the message appear to come from Microsoft.com. So the sender's address itself is not a reliable identifier.

The main red flags are the content of the message. What is the sender asking you to do? In the event of a real data breach, would a company like Microsoft demand payment in Bitcoin? The answer is no.

Don't help scammers!

Even if you realize the message is from a hacker, you may still feel compelled to pay because you want to protect your stolen media. The risk becomes more real if the sender includes personal information in the message to back up their claim.

For example, someone posted an example of one of these Microsoft emails on the Microsoft Answers forum, which included the recipient's date of birth. A date of birth is one thing—a bunch of "internet history" and secretly recorded "webcam footage" is another. Claims like this are unfounded, and it's best to report the email to Microsoft or whatever platform you received the message from.

Note : Microsoft is currently investigating this criminal activity.

If you receive an email that appears to be from a legitimate source but asks for Bitcoin, it’s probably a scam. Even if hackers have figured out how to bypass spam filters, they can’t hide their motives when it comes to the actual request. If your data is actually compromised in a breach, a reputable company like Microsoft or Google will have steps for you to take that don’t involve cryptocurrency.

Sign up and earn $1000 a day ⋙

Leave a Comment

How to Try the Mysterious GPT-2 Chatbot

How to Try the Mysterious GPT-2 Chatbot

If you are into AI models or chatbots, you might have seen discussions about the mysterious GPT-2 chatbot and its effectiveness.

10 things you can do with Microsoft Copilot

10 things you can do with Microsoft Copilot

Until you see all the things you can do with Copilot, you won't realize how impressive and useful Microsoft Copilot really is.

How to activate ChatGPT-4o on phone, computer

How to activate ChatGPT-4o on phone, computer

ChatGPT-4o is now available worldwide for everyone to experience. In addition, ChatGPT-4o also has an option for temporary chats, without saving chat history.

How to Set Up Plex for Your Family

How to Set Up Plex for Your Family

Plex is a great way to allow a household to share media across multiple devices, but for techies, it can quickly turn into a series of support requests.

How to check the number of charge cycles of a Windows laptop

How to check the number of charge cycles of a Windows laptop

To determine how much battery life your device has, you can check the battery cycles. The following article will guide you how to run the laptop battery cycle counter on Windows.

How to Use iCloud Photos on iPhone, iPad, and Mac

How to Use iCloud Photos on iPhone, iPad, and Mac

iCloud Photos lets you securely store photos, screenshots, videos, Live Photos, memories, and other items from the Photos app in the cloud.

How to turn on iCloud advanced data protection

How to turn on iCloud advanced data protection

Apple's Advanced Data Protection for iCloud uses end-to-end encryption to provide the highest level of cloud data security Apple offers.

5 Beautiful Themes to Make Your Tmux Sessions More Fun

5 Beautiful Themes to Make Your Tmux Sessions More Fun

Tmux is a versatile and powerful program. Although the developers have designed the program to be as simple as possible, it still has a lot of attractive theme plugins.

Information you should not share on social networks

Information you should not share on social networks

In this age of information explosion, some people don't think about what they share on Facebook. However, there are some things you should not share on Facebook.

Summary of ways to clone applications on the phone

Summary of ways to clone applications on the phone

You have more than 1 social network account for different purposes. Switching accounts constantly is troublesome, try cloning the application.

Instructions for inserting horizontal and vertical lines in Google Docs

Instructions for inserting horizontal and vertical lines in Google Docs

To add more effect to the document, we can use some lines, such as creating Google Docs paragraph borders, or using lines to separate paragraphs in the document.

Formula for calculating the volume of a truncated pyramid, the lateral area and total area of ​​a truncated pyramid

Formula for calculating the volume of a truncated pyramid, the lateral area and total area of ​​a truncated pyramid

Let's learn what a truncated pyramid is, how to calculate the volume of a truncated pyramid, the lateral area and total area of ​​a truncated pyramid in the article below.

Apple to launch News+ Food in April with iOS/iPadOS 18.4

Apple to launch News+ Food in April with iOS/iPadOS 18.4

Apple News+ will soon be the place to solve the age-old problem of what's for dinner.

TRUNC Function: How to remove decimals and shorten numeric values

TRUNC Function: How to remove decimals and shorten numeric values

There are different ways in Excel to remove decimals and shorten numeric values. In this article, Quantrimang.com will explain how to use the TRUNC function and point out what makes it different from other techniques.

Minimum system requirements to play Welcome to ParadiZe on PC

Minimum system requirements to play Welcome to ParadiZe on PC

Although Welcome to ParadiZe does not require too high gaming configuration, you should still refer to the gaming configuration.