Paperless Post Scam Email: How Fake “Invitation” Links Steal Your Password

Phishing emails impersonating Paperless Post invitations are circulating, and they are designed to steal login credentials, especially for high-value accounts like your email inbox.

These messages often look convincing because they mimic real invitation language and branding. In many cases, they appear to come from someone you know because the sender’s email account has already been compromised and is being used to distribute the scam.

The goal is simple: get you to click a “View Invitation” or “Open Card” link, land on a fake sign-in page, and enter your password. Once attackers have access to your email, they can reset other passwords, message your contacts, and expand the scam quickly.

This guide explains what these Paperless Post scam emails look like, how the operation works step by step, and what to do immediately if you clicked or entered any information.

scam 1

Scam Overview

Paperless Post is a legitimate service used for online invitations, greeting cards, and event announcements. That real-world credibility is what makes it attractive to attackers. They mimic the brand, the language, and the “you’ve been invited” format because it lowers your defenses.

A scam email does not need to be perfect. It just needs to feel plausible long enough for you to tap or click.

What makes this scam different from generic phishing

Most phishing emails try to impersonate banks, delivery companies, or streaming services. The Paperless Post style scam has a more personal hook.

It often looks like something sent by a friend, coworker, parent at school, or a family member. The emotional context matters:

  • You do not want to miss an event.
  • You assume the sender is real because you recognize the name.
  • You feel safe because invitations are normal.

That social trust is the lever. Once they have it, the scam is simply a credential theft operation.

The most common goal: your email login

Scammers frequently aim for your email account, not your Paperless Post account.

Why email?

Because email is the master key to your digital life.

If a criminal gets into your email account, they may be able to:

  • Reset passwords for your bank, PayPal, Amazon, or other shopping accounts
  • Access private conversations, invoices, and sensitive attachments
  • Steal contacts and use them to send more phishing emails
  • Create forwarding rules so they quietly receive your mail
  • Take over other accounts using “Forgot password” flows
  • Trick friends and coworkers using believable messages from your real address

Even if you have never used Paperless Post, the scam can still work, because the bait is the invitation. The trap is the login page that follows.

Why the sender is often someone you know

A key feature of this scam is that it often arrives from a real mailbox that has already been compromised.

Attackers commonly:

  1. Break into someone’s email account (through a previous phishing attack, reused password, or malware).
  2. Pull their contact list or recent email threads.
  3. Send “invitation” emails to the victim’s contacts.

That is why the message can feel unusually convincing. It is not always a random spoofed address. Sometimes it is your friend’s actual email account sending real email.

This is also why outbreaks can move fast through workplaces, schools, and families.

Common subject lines and phrases used

Scammers rotate wording, but the themes are consistent. You might see:

  • “You’re invited”
  • “You have a Paperless Post invitation”
  • “You received an eCard”
  • “Open your invitation”
  • “A message from [Name]”
  • “Reminder: invitation waiting”
  • “Last chance to RSVP”

Inside the email, language often pushes urgency or curiosity:

  • “View invitation”
  • “RSVP now”
  • “See details”
  • “Open card”
  • “You have a private message”
  • “This invitation expires soon”

Even when the writing is slightly awkward, the social context can override your skepticism.

What the email often looks like

Most versions share a similar structure:

  • A logo or brand-like header
  • A big button (View Invitation, Open Invitation, RSVP)
  • A short line suggesting a friend invited you
  • Sometimes a preview image for the “card” or “invite”
  • A footer with tiny text meant to look official

Some scammers also copy layout cues that resemble legitimate marketing emails. Others keep it very simple to avoid spam filters.

The link is the real danger

The visible button is usually just a link to a phishing site.

Common tricks include:

  • A lookalike domain (for example, a domain that includes words like “paperless”, “post”, “invite”, “rsvp”)
  • A completely unrelated domain hosted on a hacked website
  • A shortened link that hides the destination
  • A link that routes through several redirects before landing on the fake page

Once you click, you are taken to a page designed to capture credentials.

What happens after you click

From that point, one of these paths is typical:

Path A: Fake Paperless Post login page
The page claims you must log in to see the invitation.

Path B: Fake email provider login page
The page claims you must “verify your email” to view the invitation. It may show options like Gmail, Outlook, Microsoft 365, Yahoo, or AOL.

This second path is extremely common because it targets the account that unlocks everything else.

Path C: Fake “security check” or “confirm you’re human” flow
This is used to make the page feel legitimate before asking for credentials.

Red flags that strongly suggest a scam

Use this checklist to quickly assess an email claiming to be a Paperless Post invitation.

Red flags in the sender details

  • The sender’s display name is familiar, but the email address is strange
  • The sender’s address is a long string of letters and numbers
  • You see an unexpected “via” address or mismatched domain
  • The reply-to address differs from the from address

Red flags in the message content

  • You were not expecting an invitation from this person
  • The message feels oddly generic, with little context
  • You are pushed to click immediately (urgent RSVP, expiring link)
  • The message contains unusual grammar or spacing

Red flags in the link

  • Hovering over the button shows a domain you do not recognize
  • The link is shortened (bit.ly, tinyurl) or heavily tracked
  • The link goes to a non-business domain that has nothing to do with Paperless Post
  • The link includes random folders and strings that look auto-generated

Red flags on the landing page

  • The page asks for your email password to view an invitation
  • The page looks slightly off: blurry logo, odd fonts, misaligned elements
  • The URL does not match the real company’s domain
  • The page errors out after you enter credentials, then asks again

That “try again” loop is a classic sign of credential harvesting.

Why this scam is so effective

This type of phishing succeeds because it combines three powerful factors:

  1. Social trust: it appears to come from someone you know.
  2. Low suspicion context: invitations are normal and non-financial.
  3. High value target: the login page aims at email credentials, not a minor account.

It is a clean, scalable operation. A single compromised inbox can send hundreds or thousands of invitations. Even a small success rate can yield profitable access.

What scammers do with stolen credentials

Once credentials are captured, criminals may:

  • Log into the email account directly
  • Try the same password on other sites (credential stuffing)
  • Search the inbox for:
    • bank-related messages
    • password reset emails
    • invoices and payment confirmations
    • tax documents or identity data
  • Set up persistence:
    • forwarding rules to an external address
    • hidden filters that auto-archive security alerts
    • adding a recovery email or phone number they control

They may also monetize quickly by making purchases, moving funds, or attempting gift card fraud.

What about Paperless Post accounts and payment details?

Some victims do have Paperless Post accounts. In those cases, scammers may also attempt:

  • Account takeover to send more scam invitations
  • Access to saved contact lists
  • Access to any saved payment methods, if present

More commonly, though, the Paperless Post theme is simply the lure. The real objective is your primary email account or your Microsoft 365 account in a workplace.

Who is most at risk?

Anyone can get targeted, but these groups are hit frequently:

  • Workplaces using Microsoft 365 or Google Workspace
    Compromising one mailbox can give attackers a direct path to business data and internal contacts.
  • Parents and school communities
    Email lists spread quickly, and event invitations are routine.
  • Older adults
    Scammers exploit trust and familiarity. A “card” or “invitation” feels safe.
  • People with reused passwords
    If you reuse a password across sites, a single phish can cascade into multiple takeovers.

A safer way to check if an invitation is real

If you suspect the email might be real but you are unsure, use a safe verification approach:

  • Do not click the email button.
  • Open your browser and manually type the official Paperless Post site address that you already know, or use a trusted bookmark.
  • Log in from there.
  • Check your account notifications or invitations inside the site.

If a friend truly invited you, you can also confirm by texting them or calling them. Use a separate channel, not a reply to the suspicious email.

How The Scam Works

This is the operational flow you are dealing with. While variations exist, most Paperless Post invitation phishing campaigns follow the same playbook.

Step 1: Scammers get access to a real email account

Many campaigns start with account compromise. Attackers obtain login access through:

  • A previous phishing email (often unrelated to Paperless Post)
  • Reused passwords leaked from old data breaches
  • Malware that steals saved browser passwords
  • Weak security questions or exposed recovery options
  • Lack of multi-factor authentication (MFA)

Once inside an inbox, the attacker has a trusted identity to abuse.

Step 2: They weaponize the victim’s contact list

After access is gained, the attacker typically collects:

  • Saved contacts
  • Recently emailed addresses
  • Group lists (school groups, workplace teams, clubs)
  • Thread participants from ongoing conversations

Then they send the Paperless Post themed email to those people.

This is why the email can feel so believable. It may arrive from a real friend’s mailbox with a realistic subject line and a “friendly” tone.

Step 3: The phishing email is designed for quick clicks

The email is engineered for speed, not depth.

It usually includes:

  • A recognizable brand name
  • One big call-to-action button
  • Minimal text so you do not overthink it
  • A “personal” angle, even if vague

Sometimes scammers also include a name in the body:

  • “Hi, you’ve been invited by Sarah”
  • “A message from John”

Even if that name is generic, it nudges you into trust mode.

Step 4: The button sends you to a phishing site

When you click “View Invitation” or similar, you are routed to a website controlled by the attacker or an affiliate scam group.

There are several ways they host this:

  • A newly registered domain that resembles the brand
  • A hacked WordPress site with a hidden phishing page
  • A cloud-hosted page using common platforms
  • A compromised small business website repurposed for phishing

The page is often mobile-optimized because many victims click from phones.

Step 5: The landing page pushes you into a login prompt

The page usually shows one of these narratives:

Narrative A: “Log in to view your invitation”

This presents a fake Paperless Post style login form.

The goal is to harvest whatever email and password you type.

Narrative B: “Verify your email provider to continue”

This is more dangerous because it targets your email provider directly.

You may see buttons like:

  • Sign in with Google
  • Sign in with Microsoft
  • Sign in with Yahoo
  • Sign in with AOL

The page is not truly authentic single sign-on. It is a fake page that looks like it.

If you enter your Gmail or Microsoft 365 password here, the attacker gets your email credentials.

Narrative C: “Your session expired, sign in again”

This is a psychological trick.

Even cautious people sometimes think, “Maybe the first login did not work,” and try again, giving the attacker a second clean capture.

Step 6: Credential harvesting happens instantly

As soon as you submit credentials, they are transmitted to the attacker.

Often the site will then:

  • Redirect you to a blank page
  • Show an error message
  • Loop you back to the login form
  • Redirect you to a real site to reduce suspicion

That final redirect is a common tactic. It creates the illusion that nothing harmful happened.

Step 7: Attackers attempt account takeover

With your credentials, the attacker typically tries to log in immediately.

If MFA is not enabled, takeover can be immediate.

If MFA is enabled, they may try additional tactics:

  • Prompting you again to enter an MFA code on the phishing page
  • Using real-time phishing kits that relay credentials and codes instantly
  • Sending repeated login prompts to annoy you into approving one

Even when MFA is active, phishing still works if the attacker can trick you into giving the one-time code or approving a push notification.

Step 8: They secure persistence inside your email account

Once inside, attackers often set up ways to remain in control even if you notice later.

Common persistence actions include:

  • Creating forwarding rules
    Your emails are silently forwarded to an attacker-controlled address.
  • Creating filters that hide security alerts
    Messages from “security@” or “no-reply@” addresses may be archived automatically.
  • Adding a recovery email or phone number
    So they can regain access if you change your password.
  • Creating app passwords or connecting third-party access
    In some systems, attackers create an access method that bypasses normal sign-in checks.

Step 9: They use your account to spread the scam

Once your email is compromised, your account becomes the next launchpad.

Attackers may:

  • Send Paperless Post themed invitations to your contacts
  • Reply inside existing email threads to make it more convincing
  • Send messages that reference real recent conversations
  • Target your workplace by emailing coworkers and vendors

Thread hijacking is especially dangerous. If a scam email appears inside a real conversation history, many people will click without thinking.

Step 10: Monetization and damage

Once access is stable, attackers decide how to profit:

  • Stealing gift cards by requesting them from your contacts
  • Attempting to access financial accounts using password resets
  • Buying items using stored payment methods in shopping accounts
  • Performing identity theft using data found in your inbox
  • Selling account access to other criminal groups

Sometimes you will see small “test charges” on a card, such as $1 or $5, when criminals check whether a payment method works. Not every scam involves direct charges, but monitoring your accounts is still essential if you entered any financial details.

Variations you might see

Scammers adapt constantly. Here are common variations of the Paperless Post themed phishing email:

“You received a card” instead of an invitation

The message implies a greeting card or celebration note.

This works well around holidays, birthdays, and major events.

“Attachment included”

Some versions include a file rather than a link. The file may be:

  • a PDF that contains a malicious link
  • an HTML file that opens a fake login page in your browser
  • a ZIP file containing malware

If you download and open unknown attachments, the risk increases substantially.

“Work account required”

In corporate environments, the page may explicitly push Microsoft 365 login and show company-like branding.

This is a high-impact scenario because business email compromise can lead to invoice fraud and internal data exposure.

How to Spot the Scam Emails: Quick Checklist

Use this fast checklist anytime you receive a “Paperless Post invitation” or “card” email.

1) Attachments: what’s normal vs. what’s a red flag

Red flag: Any message that includes attachments you must download, especially:

  • .exe
  • .pdf
  • .zip
  • Office files (like .doc, .xls) you were not expecting

What to expect in legitimate emails:
Legitimate Paperless Post emails do not include .EXE or .PDF attachments. The only files typically included are embedded image files.

2) Login or download prompts

Red flag: The email says you must:

  • log in to view the card
  • “verify your account” first
  • download a file, app, or “viewer” to open the invitation
  • enter your email password to see the content

What to expect in legitimate emails:
Real Paperless Post emails should not force you to log in or download anything just to view a card or invitation.

3) Who sent it: verify the sender address

Red flag: The message comes from:

  • a random Gmail/Outlook/Yahoo address
  • a misspelled domain
  • a strange “reply-to” address that does not match the sender
  • an unrelated domain (even if the display name looks right)

Legitimate Paperless Post emails can come from these addresses:

  • paperless@email.paperlesspost.com
  • paperlesspost@paperlesspost.com
  • paperlesspost@accounts.paperlesspost.com

Official support emails can come from these addresses:

  • agent@paperlesspost.com
  • help@paperlesspost.com
  • optout@paperlesspost.com
  • pds@paperlesspost.com
  • phishing@paperlesspost.com
  • privacy@paperlesspost.com
  • security@paperlesspost.com
  • support@paperlesspost.com

If the sender address is not on this list, slow down and verify before clicking.

4) Text message links

Red flag: Any text message link that goes to a different domain, uses a link shortener, or looks unrelated.

What to expect in legitimate texts:
Real Paperless Post texts include a link that starts with:
https://pp.events/

5) Quick “safe move” when unsure

If you are uncertain, do not click the button in the email. Instead:

  • manually type the site address you trust in your browser, or use a saved bookmark
  • check your invitations inside your account
  • confirm with the sender via a separate channel (text or call) if the invite is unexpected

What To Do If You Have Fallen Victim to This Scam

Your response depends on what happened. Do not panic, but do act quickly. The earlier you respond, the more you can contain.

Below is a structured checklist. Follow the steps that match your situation.

1) If you only opened the email but did not click anything

You are likely fine, but do the basics:

  1. Delete the email.
  2. Mark it as phishing or spam in your email client.
  3. If it came from someone you know, contact them through another channel and let them know their account may be compromised.

2) If you clicked the link but did not enter any information

Treat it as a warning shot. Do this:

  1. Close the page immediately.
  2. Clear your browser tab and do not revisit the link.
  3. Run a quick malware scan if you are on a computer, especially if anything downloaded.
  4. Monitor your email account for suspicious sign-in alerts over the next 24 to 72 hours.
  5. Consider changing your email password anyway, especially if:
    • you reuse passwords anywhere
    • you are not sure whether you typed anything
    • you stayed on the phishing page for more than a moment

3) If you entered your email password on the page

Assume your email account is compromised until proven otherwise.

Do these steps in order:

  1. Change your email password immediately.
    Use a strong, unique password that you have never used elsewhere.
  2. Enable MFA on your email account.
    Use an authenticator app if possible, not just SMS.
  3. Sign out of all sessions.
    Most email providers have an option like “Sign out of all devices” or “Log out of other sessions.”
  4. Check account recovery settings.
    Look for unknown:
    • recovery emails
    • phone numbers
    • devices
    • trusted locations
    Remove anything you do not recognize.
  5. Check forwarding and filters.
    This step is critical and often missed.Look for:
    • mail forwarding to an unfamiliar address
    • rules that auto-archive or delete security alerts
    • rules that send copies of certain emails to another folder
  6. Review recent account activity.
    Check for logins from unfamiliar locations or devices.
  7. Change passwords on other important accounts.
    Prioritize accounts tied to your email:
    • banking and payment platforms
    • shopping sites
    • social media
    • any account where “reset password” goes through your email
    If you reused the same password, change those first.

4) If you entered a password for any other service

Sometimes the phishing page asks for other credentials, especially Microsoft 365.

If you entered credentials for a work account:

  1. Notify your IT team or security team immediately.
  2. Change your password following company policy.
  3. Ask IT to check:
    • mailbox rules
    • suspicious sign-ins
    • OAuth app permissions (third-party app access)
    • unusual outbound email activity

Fast reporting can prevent a broader outbreak.

5) If you entered an MFA code or approved a push notification

This is more serious because the attacker may have used the code in real time.

Do this immediately:

  1. Change your password right away.
  2. Sign out of all devices and sessions.
  3. Revoke active sessions where possible.
  4. Review account security logs.
  5. Consider regenerating backup codes if your provider uses them.
  6. If available, switch to phishing-resistant methods (such as passkeys) for key accounts.

6) If you downloaded and opened a file

If the email included an attachment and you opened it, take this seriously even if nothing “seemed” to happen.

  1. Disconnect the device from the internet if you suspect malware.
  2. Run a reputable antivirus and malware scan.
  3. Check your browser downloads folder and delete unknown files.
  4. Update your operating system and browser.
  5. Change your email password from a different, clean device if you suspect compromise.
  6. If you use the device for work, notify IT.

7) If the email came from someone you know

A lot of victims feel awkward warning the sender. Do it anyway.

Send a simple note through text message or another channel:

  • Tell them you received an invitation email that looks like phishing.
  • Ask them if they sent it.
  • Encourage them to change their email password and enable MFA.
  • Suggest they check forwarding rules and sent mail.

This can stop the scam chain.

8) Watch for secondary attacks over the next few days

After credential theft, attackers often try follow-up moves.

Watch for:

  • Password reset emails you did not request
  • Security alerts about new sign-ins
  • Emails in your “Sent” folder that you did not send
  • Contacts saying they received strange messages from you
  • Missing emails due to filters or forwarding rules

If you see any of these, treat it as confirmation of compromise and escalate your response.

9) Monitor financial accounts if there is any chance of exposure

Even if the scam targeted email, financial fallout can happen through password resets.

If you suspect any exposure:

  1. Review bank and card transactions carefully.
  2. Look for small test charges like $1, $5, or other low amounts.
  3. Consider setting transaction alerts for any purchase.
  4. If you see fraud, contact your bank immediately and dispute charges.

10) Strengthen your defenses so this does not happen again

A single set of upgrades dramatically reduces risk:

  • Use a password manager and unique passwords for every major account.
  • Enable MFA everywhere, especially email.
  • Prefer authenticator apps or passkeys over SMS where possible.
  • Treat unexpected invitations as suspicious, even from known people.
  • Verify through a second channel if the invitation is unusual.

A quick “If this happened, do this” summary

  • Clicked link only: close, scan, monitor sign-ins, consider password change
  • Entered email password: change password, enable MFA, sign out everywhere, check forwarding rules
  • Entered MFA code: treat as active compromise, reset everything immediately
  • Opened attachment: scan device, change passwords from a clean device, consider IT help
  • Came from a friend: warn them, they are likely compromised too

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

The Bottom Line

The Paperless Post scam email is a phishing attack wrapped in something that feels personal and harmless.

That is why it works.

It often arrives from real, compromised email accounts belonging to people you know, which gives it instant credibility. The “invitation” is just the hook. The real goal is your login credentials, especially for your email account, because email access can unlock everything else.

If you clicked but did not enter anything, take it as a close call and stay alert. If you entered your password or any security code, move quickly: change passwords, enable MFA, sign out of active sessions, and check for forwarding rules and hidden filters.

Most importantly, do not blame yourself. These campaigns are designed to exploit normal human behavior: curiosity, trust, and social connection. With a clear response plan and stronger account security, you can shut down the damage and make it much harder for the next attempt to succeed.

FAQ: Paperless Post Scam Email

What is the Paperless Post scam email?

It is a phishing email that pretends you received a Paperless Post invitation or card. The goal is to lure you into clicking a link and entering your login details, often your email password.

Is Paperless Post legitimate?

Yes, Paperless Post is a real service. The scam abuses its name and branding to make a fake invitation look trustworthy.

Why does the email sometimes look like it came from someone I know?

Because scammers often take over real email accounts and then send phishing messages to that person’s contacts. That makes the “From” name feel familiar even though the link is dangerous.

Do real Paperless Post emails include attachments like .pdf or .exe?

No. Legitimate Paperless Post emails should not include .EXE or .PDF attachments or other downloadable files. The only files typically included are embedded images.

Do real Paperless Post emails require me to log in or download something to view the card?

No. A message that insists you must log in, “verify,” or download a file or app just to view the invitation is a strong phishing signal.

What sender addresses are considered official?

Legitimate Paperless Post emails can come from:

  • paperless@email.paperlesspost.com
  • paperlesspost@paperlesspost.com
  • paperlesspost@accounts.paperlesspost.com

Official support emails can come from:

  • agent@paperlesspost.com
  • help@paperlesspost.com
  • optout@paperlesspost.com
  • pds@paperlesspost.com
  • phishing@paperlesspost.com
  • privacy@paperlesspost.com
  • security@paperlesspost.com
  • support@paperlesspost.com

If the sender is outside these, treat it as suspicious until verified.

What should a legitimate Paperless Post text link look like?

Real texts include a link that starts with https://pp.events/. Be cautious with shortened links or domains that do not match.

I clicked the link. Am I automatically hacked?

Not necessarily. If you clicked but did not enter any information and did not download anything, you may be fine. Still, it is smart to scan your device and monitor for unusual sign-in alerts.

I entered my email password on the page. What should I do right now?

Assume the password is compromised:

  1. Change your email password immediately.
  2. Enable MFA on your email account.
  3. Sign out of all devices and sessions.
  4. Check for mail forwarding and suspicious rules/filters.
  5. Change passwords anywhere you reused that same password.

How do I report a suspected phishing email?

Report it in your email client as phishing/spam. You can also forward or report it to Paperless Post using the official address:

  • phishing@paperlesspost.com

How can I safely check whether an invitation is real?

Do not click the email button. Instead, open your browser and go directly to the Paperless Post site from a trusted bookmark, then check your invitations inside your account. If it claims to be from a friend, confirm with them via text or a call.

Can enabling MFA prevent this scam from working?

MFA helps a lot, but it is not perfect. Some phishing pages try to capture MFA codes in real time. Still, enabling MFA on your email is one of the best protections you can add.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Leave a Comment

Previous

Beware the GlucoDrain Supplement – Scam Ads & Red Flags

Next

“Your Accountant Made a Mistake” Scam: The Fake Tax Correction Trap