The Truth About the “Microsoft Storage Limit Exceeded” Scam

A deceptive phishing scam impersonating Microsoft has been making the rounds through inboxes everywhere. This fraudulent email carries the subject line “Microsoft storage limit exceeded. Action required.” It aims to dupe unsuspecting recipients into providing their private account credentials and sensitive information.

This cunning cyberattack combines urgency, impersonation, and deception to manipulate users. If you receive an email like this, it’s crucial to recognize that it does not actually come from Microsoft. This in-depth guide will provide extensive details on how this scam operates, who it targets, and most importantly, how to protect yourself.

scam-4-5-scaled

An In-Depth Overview of the Microsoft Storage Limit Exceeded Scam

This phishing scam leverages the trusted Microsoft brand as a lure to lower recipients’ guard. The attack email claims the user’s OneDrive storage limit has been reached, impacting access to files, photos, backups, and Outlook email.

To incite urgency, it states that the recipient can no longer save new files, sync devices, or send Outlook emails until they “upgrade their Microsoft 365 plan.” It provides a prominent call-to-action button to “Get More Storage.”

How the Deceptive Email Is Constructed

The scam email uses the following deceptive and manipulative tactics:

  • Sender Address Spoofing – The “from” email address is disguised to appear it originated from a legitimate Microsoft domain like accounts@microsoft.com.
  • Official Microsoft Branding – The email incorporates Microsoft logos, fonts, colors, and other branding elements to look authentic.
  • Urgent Warning Message – The content warns the user is at risk of losing access to their files, backups, and email if action isn’t taken quickly.
  • Upsell Offer – It states upgrading the Microsoft 365 plan will conveniently resolve the storage limits right away.
  • Call-to-Action Button – A prominent button with urgent wording like “Get More Storage Now” prompts immediate click-through.
  • Phishing Link – The CTA button contains a disguised link to a fake Microsoft login page to harvest account credentials.
  • Account Specifics Omitted – It does not include any account names, storage amounts, or other specifics that would identify the scam.
  • Technical Jargon – Terms like “storage limit,” “OneDrive,” and “Outlook” are used to sound like a legitimate system notification.

Mass Targeting of Microsoft Users

The criminals send these scam emails out en masse to millions of potential victims across the globe. By spraying the attack broadly, they increase the chances of snaring people who use Outlook email and OneDrive storage.

Email addresses are harvested in large quantities from past data breaches, malware infections, website registrations, public records, and other sources. If your email is included in any database from a breach, you are likely to receive this scam attempt.

The impersonation of Microsoft makes the attack email appear credible on the surface. Recipients are more likely to let their guard down when they think an urgent notice comes directly from Microsoft itself.

An In-Depth Explanation of How the Microsoft Phishing Scam Works

If a recipient falls for the scam and clicks the “Get More Storage” button, they are redirected to a fake Microsoft login page cloned from the real Outlook and OneDrive sites. This phishing site looks authentic with copied branding elements, web layouts, images, and text.

Because it is hosted on servers controlled by the scammers, any login credentials entered on the site go directly to the criminals rather than Microsoft’s real servers.

How the Phishing Site Steals Microsoft Account Credentials

When victims arrive at the phishing page, they see a screen nearly identical to the real Microsoft site prompting them to log in with their Microsoft account credentials.

Believing they are on Microsoft’s legitimate domain, the user enters their email address and password into the provided form. These credentials transmit securely in the background directly to the scammers’ servers where they are harvested.

In some variations, the fake login page requests more extensive profile information beyond just a password. This allows the criminals to build a more complete profile for identity theft.

Once submitted, the phishing site redirects to a generic error page or Microsoft’s real homepage. This completes the illusion that the victim logged into Microsoft’s real website. The scammers now have full access to their Microsoft account.

How Criminals Leverage the Stolen Microsoft Account Access

Armed with stolen usernames and passwords, the attackers gain entry to both the victim’s Outlook email and OneDrive cloud storage if activated for that account.

Within Outlook, scammers can potentially:

  • Access and read all current and past emails
  • Download email attachments that may contain sensitive documents
  • Access contact lists to target associates with more scams
  • Forward emails to outside accounts to silently collect future messages
  • Leverage emails for identity theft of the victim and contacts
  • Delete emails and embed rules to hide their activities

Within OneDrive, criminals may:

  • Access, extract or delete personal photos, documents, videos and any files
  • Search files for financial statements, tax records, or passwords
  • Upload malicious files like ransomware to encrypted and attack other devices synced to OneDrive
  • Modify or delete files and cloud backups to cause data loss

Access to both OneDrive and Outlook provides a wealth of data the criminals can exploit and sell. Once inside the account, scammers often enable rules and notifications to receive copies of future emails without the victim’s knowledge.

Malware Installation Variations

In some cases, rather than phish for credentials, the scam site attempts to infect the visitor’s device with malware.

This is often achieved by prompting the victim to “Enable OneDrive” or “Upgrade OneDrive.” Doing so triggers a file download instead of increasing storage.

This downloaded file when opened infects the computer or smartphone with malicious software like an information-stealing Trojan or ransomware.

Now with a malware foothold, the attackers can harvest files, track keystrokes to steal passwords, covertly take screenshots, and spy through the webcam. The victimized device is fully compromised.

What to Do If You Get Tricked by the Microsoft Storage Limit Scam

If you suspect you may have fallen victim and entered your account credentials into a phishing site, follow these steps right away:

Step 1) Scan Devices for Malware

Run full antivirus scans on all computers and mobile devices to check for infections from downloaded files. Uninstall or delete any unfamiliar programs.

Look for signs of malware like pop-ups, lagging, freezes, or unexpectedly disabled antivirus software. Wipe and reset devices if infections are found.

Step 2) Change Microsoft Account Credentials

  • Log into your Microsoft account immediately and change your password. Make it long, complex, and not used on any other accounts.
  • Enable two-factor authentication for enhanced security if available.
  • Review recently used devices in account settings and revoke access for any unknown or suspicious devices.

Step 3) Review Recent Microsoft Account Activity

  • Closely check OneDrive and Outlook activity for anything suspicious, including:
  • Deleted or missing emails
  • New forwarding rules or filters
  • Unknown files uploaded to OneDrive
  • Deleted or altered OneDrive files
  • Unfamiliar devices accessing the account
  • Download a copy of your emails from Outlook and OneDrive files to preserve evidence in case of losses.

Step 4) Remove Linked Accounts and Payment Methods

  • In your Microsoft account settings, unlink any connected social media, email, financial, or other accounts the hackers could access.
  • Remove any stored credit cards or payment accounts to prevent fraudulent charges.

Step 5) Reset Passwords On Other Accounts

If you reused the same password on other accounts, change it everywhere immediately. Focus on financial, work, social media, and email accounts first.

Step 6) Monitor Your Credit and Accounts

  • Place fraud alerts on your credit files and consider freezing your credit to block identity theft and new accounts.
  • Obtain your free credit reports to review for any accounts opened without authorization.
  • Closely monitor financial statements and account activity for signs of abuse of your information.

Step 7) Contact Microsoft Support

  • Notify Microsoft Support about the compromised account and phishing attack. They can help secure your account and watch for further unauthorized activity.
  • Provide details on exactly when and where you entered your login credentials.

Step 8) Warn Contacts Who May Have Gotten Scam Emails

Let your friends, family, and colleagues know to watch for suspicious emails if the scammers accessed your contacts. Criminals often target contacts next using compromised accounts.

Step 9) Reinstall Software and Restore Data

On affected devices, perform factory resets to wipe them clean after backing up your files. Reinstall operating systems and software from scratch rather than from backups. Restore personal data only after the system is cleaned.

How to Spot This Outlook Phishing Scam Before It’s Too Late

The clever social engineering tactics used in the “Microsoft storage limit exceeded” phishing scam can fool many cautious users. Here are some tips to help identify and avoid this malicious attack:

Be Wary of Urgent Unsolicited Emails

Microsoft and other major companies will not suddenly contact you with urgent account notices via unsolicited email. Any legitimate notifications would be delivered through trusted channels like pre-established message centers or when logged into the real website.

Verify the Sender Address

Don’t rely on the “from” name shown. Use the email header details or properties to examine the actual underlying sender address. Hover to display the real domain, which is often mismatched or suspicious for phishing emails.

Look for Missing Personal Details

Real notifications from Microsoft include specifics like your account name, storage used, account type, and other personalized details. Lack of these specifics is a red flag.

Don’t Trust Links or Attachments

Never click links or download attachments from unsolicited emails. Even if the message looks real, the links lead to phishing sites. Manually navigate to any websites you need.

Watch for Poor Spelling and Grammar

Phishing emails often contain typos, grammatical mistakes, awkward phrasing, and other writing flaws a large company like Microsoft would not make.

Verify Through Other Channels

Check directly within your Microsoft account or contact customer service to see if there are really any storage, billing, or account issues.

Use Caution on Mobile Devices

The small screens make it harder to inspect emails closely on smartphones and tablets. View on a larger screen if possible and be extra vigilant.

Keep Software Up to Date

Ensure your operating system, antivirus software, browsers, and other applications have the latest security patches which may block newly discovered phishing tactics.

Secure Accounts with MFA

Enable multi-factor authentication and other enhanced security options for Microsoft and other sensitive accounts. This prevents criminals from accessing accounts with only stolen passwords.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Windows.

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the MBSetup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Download

    You may be presented with a User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the Malwarebytes installation.

    Click Yes to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes setup wizard which will guide you through the installation process. The Malwarebytes installer will first ask you what type of computer are you installing this program on, click either Personal Computer or Work Computer.
    Malwarebytes setup: Click on Personal Computer

    On the next screen, click “Install” to install Malwarebytes on your computer.

    Click on Install to install Malwarebytes

    When your Malwarebytes installation completes, the program opens the Welcome to Malwarebytes screen.

  4. Click on “Scan”.

    Malwarebytes is now installed on your computer, to start a scan click on the “Scan” button. Malwarebytes will automatically update the antivirus database and start scanning your computer for malicious programs.

    Click on Scan button

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.

    Malwarebytes scanning for malware

  6. Click on “Quarantine”.

    When the Malwarebytes scan is finished scanning it will show a screen that displays any malware, adware, or potentially unwanted programs that it has detected. To remove the adware and other malicious programs that Malwarebytes has found, click on the “Quarantine” button.

    Review the malicious programs and click on Quarantine to remove malware

  7. Restart computer.

    Malwarebytes will now remove all the malicious files and registry keys that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes requesting to restart computer to complete the malware removal process

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About the “Microsoft Storage Limit Exceeded” Scam

What is the “Microsoft storage limit exceeded” scam?

This is a phishing scam where targets receive an email pretending to be from Microsoft, warning them that the storage limit on their Microsoft OneDrive account has been reached. It provides a fake button to “increase storage” which actually leads to a phishing site to harvest login credentials.

Why does this phishing attack say my Microsoft storage is full?

The criminals behind this scam are posing as Microsoft and making up an urgent storage limit issue. There is no actual problem with your Microsoft storage. This fake emergency is to encourage you to click their links quickly without checking carefully.

How did the scammers get my email address?

The attackers likely obtained your email through a data breach or by purchasing stolen email lists online. They send these phishing attempts to millions of addresses at once, hoping some Microsoft users fall victim.

Does this mean my Microsoft account is hacked?

No, receiving this email does not mean your Microsoft account has been compromised at this point. It is simply a mass phishing attempt trying to steal credentials. As long as you don’t click their links, your account remains secure.

What happens if I click the “Get More Storage” link?

The link goes to a fake Microsoft login page operated by the scammers. If you enter your username and password, the criminals will capture them and gain access to your Microsoft account, including email and files.

How can I tell this email isn’t really from Microsoft?

Real notifications from Microsoft would never include an urgent warning or links to correct problems. Carefully inspecting the sender address also reveals it is not really a Microsoft domain.

What should I do if I entered my credentials into the phishing site?

If you supplied your username and password, immediately change your Microsoft password, enable 2-factor authentication, check for malware, monitor account activity closely for unauthorized actions, and contact Microsoft support.

How can I protect myself from this Microsoft phishing scam?

Be wary of unsolicited emails, don’t click links, check sender addresses, avoid entering credentials into websites you didn’t navigate to yourself, and use unique secure passwords on all accounts.

What should I do if I receive this phishing email?

Do not click any links or buttons. Forward the scam email to Microsoft at phish@office365.microsoft.com and delete the message. You can also report the scam attempt in your Microsoft 365 admin center under Threat management.

Conclusion: Don’t Get Tricked by Convincing Microsoft Phishing Scams

Sophisticated phishing scams impersonating Microsoft and other major companies are on the rise. Always exercise caution with unsolicited emails, no matter how genuine they may appear on the surface.

Remember that Microsoft will never email you out of the blue regarding account issues and provide links to correct problems. Any legitimate notifications would appear within your account portal or official Microsoft apps.

If you receive an urgent email claiming your Microsoft account storage is full, forward the message to Microsoft’s phishing reporting email before deleting it: phish@office365.microsoft.com. Simply trusting the Microsoft branding could result in stolen credentials, data loss, identity theft, and malware infection.

With vigilance and security smarts, you can protect yourself and your data from these convincing phishing scams aiming to harvest your sensitive information. Don’t let urgency or slick branding trick you next time.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment