The FAKE “Windows Defender Subscription” Email Scam Explained

The internet can be a dangerous place, and one scam that has been making the rounds targets Windows users through a deceptive email. This fraudulent email claims that the recipient has purchased or renewed a Windows Defender subscription, when in reality they have not. Victims who engage with the scammers behind this trick are at risk of having their computers infected with malware, their personal information stolen, or even being tricked into purchasing unwanted tech support services. Read on to learn all about how this Windows Defender subscription email scam operates, how to identify these fraudulent emails, and what you should do if you or someone you know has fallen victim to this con.

scam 1 1

An Overview of the Windows Defender Subscription Email Scam

The Windows Defender subscription scam starts with an email informing the recipient that they have purchased or renewed an annual subscription to Windows Defender for $299.99. The email includes fake invoice details to look official, with an order number, date, and basic product information.

However, the email address it is sent from and other details are spoofed to make it appear that the email is from Microsoft or a legitimate vendor. In reality, the whole thing is a scam designed to trick users into calling the number included in the email or clicking on a link.

Once contact is made, the scammers utilize clever social engineering techniques to gain remote access to the victim’s computer. From there, they can install malware, steal personal data and banking information, encrypt files for ransom, and more.

They often pressure and intimidate victims into purchasing unnecessary “security software” or “tech support” services to fix non-existent issues. The scammers bank on taking advantage of users who don’t have enough technical knowledge to realize they are being duped.

Some key things to know about this scam:

  • It is completely fraudulent, Microsoft does not send unsolicited notices about renewed Windows Defender subscriptions.
  • The scammers utilize spoofing techniques to make the sender email addresses and domain names appear legitimate at first glance.
  • The emails contain logos, formatting, and language designed to mimic real subscription notices from Microsoft. This adds legitimacy to the scam for unsuspecting users.
  • If users call the phone number or click any links, they risk allowing remote access to their computer and exposing personal data.
  • Once scammers gain access, they use malware, coercion, and deception to steal funds or sensitive information from the victim.

This scam has been around for years, but the scammers continuously evolve their techniques to fool as many people as possible. They rely on prototypical phishing techniques, with mass-spammed emails that seek to gain trust and tempt users to engage. Staying vigilant and identifying the signs of this scam is crucial.

How the Windows Defender Subscription Email Scam Actually Works

The Windows Defender subscription scam is executed in a few key stages once an email is sent out and a target interacts with it:

Stage 1: Sending Fraudulent Emails

The scammers obtain or generate lists of valid email addresses, often through hacking databases, sketchy online lists, or buying the lists from other scammers. They then utilize email spoofing services and apps to mask the sender address. The from name, email address, and reply-to address are all forged to make it seem as if Microsoft sent the email.

Subject lines commonly used include:

  • Windows Defender Subscription Confirmed
  • Windows Defender Payment Receipt
  • Action Required: Validate Your Windows Defender Subscription

Email templates mimic legitimate subscription receipts, with Microsoft logos, formatting, and standard billing details for a fake $299.99 Windows Defender order.

Some emails claim the subscription is expiring and must be renewed, while others say it has already auto-renewed. These emails are spammed out to thousands – or even millions – of recipients. Even just a tiny response rate results in many victims.

Here is how the scam email might look:

Subject: Order Confirmation

INVOICE NUMBER

DATE OF ISSUE
02 February, 2025

PRODUCTS ORDERED (1)

Windows Defender Advanced Threat
Protection Firewall & Network Protection
(One Year Subscription)

Product Price
$299.99

Quantity: 1

ORDER DETAILS

Subtotal $299.99
Tax $0.00
Total $299.99

Dear customer,
If You didn’t make this purchase or if you believe an unauthorized person is attempting to access your Microsoft account Call to our customer care representative [phone number] (Toll Free).

Stage 2: Tricking Users to Call or Click

If recipients of the spammed email don’t identify it as a scam, many will call the phone number or click links within the email. The number often appears to be a legitimate Microsoft helpline at first glance. Users call thinking they will get Microsoft support to clear up the supposed errant order.

However, the number actually routes to a scam call center, frequently based overseas. When users click the links, they are typically sent to fake Microsoft lookalike sites controlled by the scammers.

Whether called or clicked, the goal is to get victims to engage with the scammers directly.

Stage 3: Gaining Remote Access

Once users make contact, the social engineering really kicks in. The scammers on the phone are personable, sympathetic sounding professionals. They express concern about the unauthorized order, offering to look into the matter and help cancel it.

To pull this off, they ask to connect remotely to the victim’s computer – often via an app like AnyDesk. This allows full access to the operating system.

If the links in the email were clicked instead, users are walked through downloading remote access apps with the claim it is a Microsoft-verified tool needed to diagnose the issue.

Victims are assured remote access is standard procedure and completely safe. But in reality, it opens the door for the scam.

Stage 4: Installing Malware & Stealing Data

With remote access established, the scam really takes a turn. The scammer pretends to review the system configuration and accounts, then claims they have discovered major security issues that need immediate action.

Some common claims they use include:

  • Your copy of Windows Defender is expired, putting your system at risk.
  • Malware or a dangerous virus has infected your computer.
  • Your IP address is being misused by hackers to access the dark web.
  • Your identity has been compromised, with hackers accessing your accounts.

Whatever fabricated issue they manufacture, the scammer pressures the victim that they are in huge danger unless they take action immediately.

They often install malware at this point without the user realizing it. Keyloggers, password stealers, remote access trojans, and more are installed to extract sensitive data for later abuse. The scammer may also silently dig through files and accounts looking for financial logins, tax data, and other personal information.

Victims are completely oblivious to the real scam taking place behind the scenes through remote access.

Stage 5: Pressuring Victims for More Funds

Once finished stealing data and compromising the computer, the scammer moves to profit financially from the scam.

They pressure the victim to purchase security software or expensive technical support plans, claiming it is the only way to clean the system or stop hackers from the “issues” discovered. Prices start at $200 or more for multi-year services.

Scammers often request payment in gift cards, cryptocurrency, bank transfers or other hard to reverse methods. Many frightened victims end up relenting and paying, for fear of serious consequences if they don’t act.

This all leads to massive profits for the scammers. On top of fraudulent payments, the stolen personal information taken through malware leads to identity theft and financial fraud as well.

What to Do If You Have Fallen Victim to the Windows Defender Email Scam

If you engaged with the scammers and provided remote access or paid money, don’t panic. Here are the key steps you should take to limit the damage and secure your devices.

Disconnect From the Internet

If the scammer still has remote access to your computer, disconnect it from Wi-Fi immediately. Terminate the remote connection through Task Manager or a force shut down. This cuts off the scammer’s access and prevents further actions.

Scan for Malware

It’s highly likely your system is infected with malware if remote access was given. Download legitimate scanners like Malwarebytes to perform a full system scan. Quarantine or delete anything suspicious found. Also update Windows Defender and run a scan.

Change All Passwords

With malware and remote access, assume your passwords have been compromised. Change passwords immediately for email, financial accounts, and any other sensitive logins. Enable two-factor authentication wherever possible for added security.

Contact Banks and Credit Issuers

Contact your bank and credit/debit card issuers to block potential fraudulent charges or cash transfers. Alert them your credentials may have been stolen. Monitor accounts closely for signs of misuse over the next few months.

Perform a System Restore

If your computer is still not functioning properly, you likely have lingering malware or damage. Wipe the system by performing a full system restore to factory settings. Ensure your data is backed up first.

Report the Incident

Report what happened to cybersecurity officials so they can investigate the scammers. File complaints with the FTC, FBI Internet Crime Complaint Center, and your local authorities. Include as many details as you have, like phone numbers called, email headers, and payment info.

Inform Contacts

Let your friends and contacts in your email or address book know of the scam if the crooks accessed it. This prevents it from spreading further to your network.

Staying vigilant is key. If you receive a suspicious tech support email out of the blue, don’t call or click on anything. Go directly to the site of the company it claims to represent – like Microsoft – to see if it is legitimate. Use common sense when dealing with any unsolicited contacts demanding payment or access to your devices.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

Frequently Asked Questions About the Windows Defender Subscription Scam

1. What is the Windows Defender subscription scam email?

The Windows Defender subscription scam email is a fraudulent email sent out to unsuspecting recipients claiming they have purchased or renewed an annual Windows Defender subscription. The email contains fake invoices and order details for a $299.99 subscription purchase. In reality, it is a scam to trick users into calling the scammers or clicking malicious links. Once engaged, the criminals use social engineering and malware to access victim’s computers, steal data, and siphon funds.

2. How can I identify the Windows Defender subscription scam email?

These fraudulent emails often contain:

Subject lines related to confirming, validating or reviewing a Windows Defender purchase.
Microsoft logos and formatting designed to look legitimate.
Details for a $299.99 Windows Defender order you never actually placed.
Instructions to call a phone number or click a link to cancel, renew, or “fix” issues.
Sender addresses and reply-to emails spoofed to mimic Microsoft domains.
If an email has these characteristics but you never made the purchase claimed, it is definitely the Windows Defender subscription scam.

3. What happens if I call the phone number or click the link?

The phone numbers go to fraudulent call centers run by the scammers themselves. The links typically direct to fake Microsoft lookalike sites also controlled by the scammers. If you call or click, they will use clever deception and false threats to trick you into providing remote access to your computer. This allows them to stealthily install malware and steal personal data.

4. What do the scammers do once they gain remote access?

Once remote access is established, the scammers pretend to diagnose your system. They will falsely claim to find serious security issues like viruses, expired anti-virus software, or compromised identity theft issues that require immediate payment to resolve. In reality, they are typically installing keyloggers, password stealers, and other malware without your knowledge during this time. They use the malware and direct access to steal banking info, logins, identity details, and other sensitive data.

5. How can I prevent falling victim to this scam?

Never call numbers in unsolicited emails claiming you need to renew a subscription or pay for a service.
Don’t click any links in unexpected emails related to anti-virus software or security issues.
Contact the company directly through known legitimate channels like their official website to inquire about notifications.
Use common sense caution with any outreach demanding payments or access to your device to fix urgent issues you were not already aware of.
Carefully verify the full sender address and review linked URLs for any red flags before engaging with an email.

6. What should I do if I already provided remote access or paid money to the scammers?

If you already fell victim, immediately disconnect your device from the internet and force restart it to sever the remote connection. Run anti-malware scans, change all account passwords, monitor financial accounts for fraud, and report the incident to authorities. Alert your contacts of the scam if the crooks accessed your address book. A full system restore may be required if malware persists.

7. How can I report this scam to help prevent others from being victimized?

Reporting this scam to authorities can help get the fraudulent phone numbers and emails shut down. File detailed complaints with the FTC, FBI Internet Crime Complaint Center, Microsoft, and your local law enforcement. Include as many specifics as possible like phone numbers, email headers, bitcoin wallets, etc. to aid investigations.

The Bottom Line on the Windows Defender Subscription Email Scam

This scam has swindled countless unsuspecting individuals who didn’t realize they were being targeted by fraudsters. The emails lookconvincing, and the scammers seem professional once contact is made. It’s easy to see how so many end up falling for the con.

If an unexpected email claims you purchased or renewed an expensive subscription you don’t recall, exercise extreme caution. The Windows Defender scam preys on lack of cybersecurity knowledge, using system warnings and high pressure tactics to extort victims. Be skeptical of any unsolicited messages demanding immediate payment or offering fixes to issues you aren’t already aware of.

You may also like

Share This Article
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *