Infomedics Outstanding Healthcare Payment Scam Emails – What To Know

A wave of phishing emails is using the Infomedics name to scare people into paying fake “outstanding” healthcare bills. These messages often claim that a medical payment has not been received and pressure the recipient to pay quickly through a link.

Infomedics is a real medical billing service, but these emails are not legitimate bills. The safest move is simple: do not click the link, do not open attachments, and verify any bill directly through the official Infomedics website or bill checker. Infomedics states that genuine emails come from rekening@infomedics.nl, that real bills include specific identifying details, and that Infomedics does not send direct iDEAL or Wero payment links by email.

scam 1

Scam Overview

The Infomedics Outstanding Healthcare Payment scam is a phishing email campaign built around one very effective fear: the idea that you owe money for healthcare and may face extra costs if you do not pay quickly.

The email usually appears to come from “Infomedics,” a legitimate company that handles billing for healthcare providers in the Netherlands. That detail makes the scam more convincing. Many people do receive real healthcare invoices through Infomedics, so a message about a medical bill may not seem strange at first.

Scammers exploit that familiarity. They copy the tone of administrative billing emails, use formal wording, mention a “dossier number,” and demand payment within a short deadline. Reported examples have used subject lines such as “Openstaande Vordering – Infomedics,” which means “Outstanding Claim – Infomedics.” Fraudehelpdesk published one reported example dated February 17, 2026, demanding a payment of 155,54 and warning that further collection measures could follow if the recipient did not pay.

Other public warnings describe fake Infomedics emails asking for amounts around €115 to €158. Opgelicht?! reported a phishing email claiming that €115,14 was outstanding and that payment had to be made within 7 days to avoid further collection action.

The scam is dangerous because it does not rely on a wild promise or an obvious prize. Instead, it uses a realistic everyday situation. A person sees a healthcare-related payment request, recognizes the Infomedics name, and worries that ignoring it could lead to collection fees, debt problems, or trouble with a medical provider.

That pressure is exactly what the criminals want.

Why This Scam Feels Convincing

The fake email is designed to look ordinary, not dramatic. It may use polite language such as “Dear sir/madam,” mention “according to our records,” and claim that a payment for a specific file has not yet been received.

The message may also include:

  • A fake dossier number
  • A short payment deadline
  • A specific amount owed
  • A link labeled as “Mijn Infomedics” or “My Infomedics”
  • References to iDEAL or Wero
  • Threats of extra fees or collection measures
  • A copied Infomedics-style signature
  • A sender display name that says “Infomedics”

The goal is to create just enough trust and just enough anxiety to make the recipient click before checking carefully.

One important detail is that the sender name can be faked. Infomedics warns users to check the full email address, not only the display name, because criminals can easily make the visible sender name look like “Infomedics.” According to Infomedics, real emails are sent from rekening@infomedics.nl.

The Payment Link Is the Trap

The core of the scam is usually the payment link. The email tells the recipient to click a link to pay the outstanding balance. That link may lead to a fake payment page, a copied login page, or a malicious payment environment controlled by criminals.

Infomedics states that genuine Infomedics emails contain a blue button that leads to rekening.infomedics.nl, where payment can be completed securely. It also states that Infomedics does not send direct iDEAL or Wero payment links by email.

That distinction matters. A real Infomedics email may guide you to the official payment environment, but the company warns that direct iDEAL or Wero links inside the email are not how Infomedics handles legitimate billing.

This is one of the easiest red flags to check. If the email pushes you directly into payment through a suspicious link, treat it as dangerous.

Attachments Are Another Red Flag

Some phishing emails include attachments that pretend to be invoices, payment notices, or collection documents. These attachments may contain malware, phishing forms, or files designed to make the scam seem official.

Infomedics says it does not attach the full bill to the email because a healthcare bill contains personal and medical information. Instead, the full invoice can only be accessed after an SMS check on the official Infomedics website.

That means an email attachment claiming to contain the full Infomedics bill should be treated as suspicious.

Real Infomedics Bills Have Specific Details

A legitimate Infomedics bill should contain several recognizable elements. Infomedics says a real bill clearly names the healthcare provider, addresses the recipient personally, and contains a payment reference number of 14 digits that always ends in 071. Infomedics also advises users to check the payment reference through the official bill checker or its digital assistant Ella.

Opgelicht?! also highlighted the same checks, including the 14-digit payment reference ending in 071, the healthcare provider name, the absence of attachments, and the SMS control step used to open the real bill.

A fake email may copy some of these elements, but it often fails when you check the details independently. For example, the email may not mention a real healthcare provider you visited, may use a generic greeting, or may include a dossier number that cannot be verified through the official Infomedics bill checker.

This Does Not Mean Infomedics Was Hacked

A common fear is that receiving a fake Infomedics email means Infomedics suffered a data breach. Infomedics directly addresses this concern and states that there is no data breach at Infomedics. The company explains that criminals can buy or obtain large lists of email addresses from other sources and then send phishing emails using the name of a trusted billing organization.

That point is important for victims. Receiving the email does not automatically mean your medical records were exposed. In many phishing campaigns, scammers send mass emails to thousands of people and rely on the fact that some recipients will recognize the company name.

Still, the email should be taken seriously because the payment link can lead to real financial loss.

How The Scam Works

Step 1: The Scammer Sends a Fake Infomedics Email

The scam begins with an email that appears to come from Infomedics or an Infomedics-related billing department. The subject line often refers to an outstanding claim, unpaid healthcare bill, unpaid dossier, or overdue payment.

The message is usually written in a formal administrative style. It may say that the payment for a specific dossier has not been received. It may also say that the recipient must pay within 7 days to avoid collection measures or extra costs.

This wording is deliberate. Healthcare bills are serious, and collection warnings create urgency. The scammer wants the recipient to think, “Maybe I forgot to pay this,” rather than, “This may be a scam.”

Fraudehelpdesk’s example shows this pattern clearly. The fake message says the payment for a dossier has not been received, asks the recipient to pay via iDEAL or Wero, and warns that additional costs may be charged if the payment is not made within the deadline.

Step 2: The Email Uses a Real Company Name to Borrow Trust

The Infomedics name is the hook. Because Infomedics is connected to real healthcare billing, the scam does not need to explain much. The name itself creates credibility.

This tactic is common in phishing. Criminals impersonate organizations that people already know, such as banks, delivery companies, tax agencies, telecom providers, and healthcare billing services. In this case, the healthcare angle makes the email feel more personal and urgent.

A person may not remember every appointment, invoice, partial reimbursement, pharmacy bill, or dental charge. That uncertainty gives scammers room to operate.

The victim may think:

  • “Maybe this is from my dentist.”
  • “Maybe my insurance did not cover something.”
  • “Maybe I missed a bill in my inbox.”
  • “I do not want this to go to collections.”
  • “It is only around €115 to €158, so I should just settle it.”

That last thought is especially dangerous. The amount is large enough to feel important, but not so large that every person will stop and investigate deeply.

Step 3: The Message Adds a Deadline

The fake email usually includes a short payment window, often 7 days. This deadline is not there for administrative clarity. It is there to reduce critical thinking.

When people feel rushed, they are more likely to click links, skip verification, and ignore small warning signs. A deadline also gives the scammer a reason to include threatening language about extra fees or collection measures.

This kind of pressure is a major phishing signal. Real billing companies may send reminders, but they do not need you to pay through a suspicious link without checking the account through official channels.

A safe rule is this: urgency does not prove legitimacy. In many scams, urgency is the main weapon.

Step 4: The Link Leads Away From Safe Verification

The email usually asks the recipient to click a button or link to “pay now,” “go to My Infomedics,” or “settle the outstanding amount.” The visible text may look harmless, but the actual destination can be different.

On a phone, this is even riskier because it is harder to inspect a full URL. Scammers know many people read email on mobile devices, where long links are hidden and the screen gives less room to notice suspicious domains.

Infomedics warns users to check the browser URL carefully and gives examples of lookalike domains that are not legitimate Infomedics pages, such as misspelled or modified versions of the name.

These fake domains are meant to look close enough that a rushed person will not notice the difference.

Examples of suspicious patterns include:

  • Extra words before or after “infomedics”
  • Misspellings that look similar at a glance
  • Domains that do not end in the official Infomedics domain
  • Shortened links
  • Payment pages that open directly from the email
  • URLs that use unfamiliar extensions
  • Pages that ask for more data than needed

The safest approach is not to inspect the link inside the email at all. Instead, open your browser yourself and go to the official Infomedics website manually.

Step 5: The Fake Page Collects Money or Data

Once the victim clicks, the destination may try to collect payment immediately. It may show a payment page that imitates a trusted process, or it may route the victim into a criminal-controlled payment flow.

The page may ask for:

  • Bank selection
  • Name and address
  • Email address
  • Phone number
  • Payment details
  • Login credentials
  • Verification codes
  • Banking approval through a mobile banking app

If the victim enters information or approves a payment, the scammers may receive the money directly. In some cases, the fake page may also harvest personal data that can be used for future scams.

This is why clicking the link is risky, but paying through the link is far more serious. Infomedics states that if someone only clicked the phishing link and did not pay, they should close the website and delete the email. If they paid through the link, Infomedics advises contacting the bank immediately, changing passwords, checking bank statements, and filing a police report if needed.

Step 6: The Scammer May Use Follow-Up Pressure

Some scams do not stop after the first email. The recipient may receive more payment reminders, similar emails with different amounts, or messages that appear to escalate the case.

The scammer may change the subject line, use another fake dossier number, or send the same payment demand from a different email address.

This repetition is meant to normalize the message. If someone sees several reminders, they may start to believe the bill is real.

Do not assume that multiple emails make the claim legitimate. Phishing campaigns often send repeated messages because the cost of sending email is low and the payoff from even a small number of victims can be high.

Step 7: The Victim Discovers the Bill Does Not Exist

Many victims realize something is wrong only after checking the official Infomedics portal, contacting their healthcare provider, or noticing that the payment reference does not validate.

A real Infomedics invoice should be verifiable through official channels. If the bill does not appear in the Infomedics bill checker, if the payment reference is missing or invalid, or if the healthcare provider listed in the message is unknown to you, the email should be treated as fraudulent.

Infomedics specifically advises users who doubt an email to check the payment reference in the official bill checker or with Ella, its digital assistant. If there is no payment reference, or if the reference is not recognized, Infomedics says the email is probably fake.

Step 8: The Scam Continues Because It Targets Uncertainty

This scam works because healthcare billing can be confusing. People may receive bills after appointments, after insurance processing, after pharmacy purchases, or after treatment. Some bills arrive digitally, some arrive by post, and some are handled by third-party billing services.

Criminals use that complexity. They do not need every recipient to believe the email. They only need a small percentage of people to be uncertain enough to click.

The best defense is to remove uncertainty by checking the bill outside the email.

Do not use the email link. Do not trust the sender name. Do not open an attachment. Do not pay because the message sounds urgent.

Go directly to the official Infomedics website and verify the bill there.

What To Do If You Have Fallen Victim to This Scam

  1. Stop interacting with the email immediatelyDo not click the link again. Do not reply to the message. Do not download any attachments. Do not forward the email to friends or family except when reporting it to the correct organization.Leave the email available for reporting if you still have it, but do not continue interacting with it.
  2. If you only clicked the link, close the pageIf you clicked the link but did not enter any information and did not make a payment, close the page. Infomedics says that in the case of these fake Infomedics emails, simply clicking the link is often not dangerous if no payment was made. Still, delete the email and stay alert for follow-up messages.
  3. If you entered banking details or approved a payment, contact your bank nowCall your bank through the official number listed in your banking app or on the bank’s official website. Tell them you may have paid through a phishing link.Ask whether the payment can be blocked, reversed, investigated, or flagged as fraud. Speed matters. The sooner you contact the bank, the better your chances of limiting the damage.
  4. Change passwords connected to the incidentChange your email password first, especially if you entered any login details on the fake page. Then change passwords for banking, healthcare, payment, and other sensitive accounts if you reused the same password.Use unique passwords for every important account. If possible, store them in a reputable password manager.
  5. Check your bank account for unusual transactionsReview recent transactions carefully. Look for payments you do not recognize, small test charges, or transfers to unfamiliar names.Keep checking for several days. Some criminals use stolen details later, not immediately.
  6. Verify the bill through the official Infomedics portalGo to the official Infomedics website by typing the address into your browser yourself. Use the bill checker or official account tools to see whether the invoice exists.Do not use links from the suspicious email. If the payment reference is missing, does not match, or is not recognized, that supports the conclusion that the email was fake.
  7. Contact Infomedics through official channelsInfomedics provides a way to report suspicious emails through its phishing and internet fraud page. It also states that suspicious messages can be uploaded through the official form. When reporting, include screenshots or the original email file if requested. Do not alter the email more than necessary, because headers and sender details may help with investigation.
  8. Report the scam to local fraud authoritiesIn the Netherlands, Fraudehelpdesk accepts reports of suspicious and false emails. Fraudehelpdesk’s Infomedics example asks recipients to forward suspicious emails to valse-email@fraudehelpdesk.nl and then delete them.If money was stolen, also consider filing a police report. Infomedics also lists filing a police report as one of the steps after paying through a phishing link.
  9. Warn family members who may receive similar emailsThis scam can easily target older adults, patients, parents, caregivers, and anyone who receives healthcare bills. A short warning can prevent someone else from paying.Tell them the key signs:
    • Do not pay through direct iDEAL or Wero links in the email.
    • Do not open invoice attachments.
    • Real Infomedics emails come from rekening@infomedics.nl.
    • Real bills should be checked through the official Infomedics bill checker.
    • A real Infomedics bill should mention the healthcare provider and include a 14-digit payment reference ending in 071.
  10. Stay alert for recovery scams

If you lost money, be cautious of anyone who contacts you claiming they can recover the funds for a fee. Recovery scams often target people shortly after a phishing incident.

Work only with your bank, official law enforcement channels, and legitimate consumer fraud organizations.

The Bottom Line

The Infomedics Outstanding Healthcare Payment scam email is a realistic phishing attack that uses the name of a real medical billing company to demand fake healthcare payments. The email may mention an unpaid dossier, a 7-day deadline, and an amount around €115 to €158, then push you toward a malicious payment link.

Do not pay through links in suspicious emails. Do not open attachments. Check the sender address, verify the payment reference, and go directly to the official Infomedics portal to confirm whether a bill is real.

The safest rule is simple: when a healthcare payment email creates urgency, pause first. A real bill can be verified through official channels. A scammer depends on you clicking before you check.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Comment on this post

Previous

Formal Notice of Delinquency Text Scam EXPOSED: Fake Toll Debt Warning

Next

Google New Login Text Scam: The Fake Unrecognized Device Alert