Have you received an email that appears to come from PayPal saying you successfully purchased a firearm or ammunition from Springfield Armory? The email includes an invoice and urges you to call a provided billing number. This is a scam aiming to steal your personal and financial information.
Springfield Armory is a reputable Illinois-based gun and ammunition company founded in 1794. Scammers are impersonating the brand to target gun enthusiasts with this sneaky phishing scam. But learning how to recognize the signs of this fraudulent invoice email can keep you from becoming the scammers’ next victim.
Overview of the Springfield Armory PayPal Scam
This scam starts with an email designed to look like it is from PayPal. The email claims you recently completed a purchase from Springfield Armory for a specific firearm or ammunition, sometimes worth hundreds of dollars.
An invoice is attached documenting the supposed transaction. The email urges you to call a provided billing department number immediately to address the charge.
However, if you call the number, you won’t reach PayPal’s real billing department. Instead, scammers posing as PayPal agents answer the phone. Their goal is to trick you into providing enough personal information to steal your identity and drain your bank account.
This scam preys on gun owners who may have a legitimate interest in Springfield Armory products. But recognizing a few red flags can help you avoid the trap.
Spotting the Springfield Armory PayPal Invoice Scam
While made to look official, a trained eye can identify indicators this PayPal email is a fraud:
- No real transaction – The supposed gun purchase does not show up in your PayPal account history.
- Grammatical errors – Real PayPal emails would not contain typos, poor grammar or awkward phrasing.
- Unofficial sender address – The “From” email does not come from an official @paypal.com or @springfield-armory.com address.
- Bogus billing number – The phone number has an unusual area code and clearly does not belong to PayPal’s real billing department.
- Threatening urgent tone – PayPal would not threaten account suspension or legal action if you did not call immediately. This scare tactic is designed to panic victims into calling.
How the Springfield Armory PayPal Scam Works
Here is exactly how scammers carry out this scam to try and steal your personal information:
1. You Receive the Fake PayPal Email
The scam starts with an email landing in your inbox claiming to be from PayPal Billing. The subject line often says something like “Your Order from Springfield Armory Has Shipped” or “Springfield Armory Invoice Attached.”
The email claims you recently completed a purchase from Springfield Armory for a specific gun or ammunition product.
An attached invoice includes bogus details like a fake order number, transaction ID, and the total supposedly charged to your PayPal account, often $300-$500.
2. Email Urges You to Call Immediately
The email stresses the importance of calling the included billing department number within 24 hours to address the charge.
A threatening urgent tone warns that failure to call could result in account limitation, suspension, or even legal action. This scare tactic aims to get victims to call right away out of fear.
3. You Call the Bogus Billing Number
Anxious about the supposed unauthorized charge, you call the billing number provided in the email. But it does not connect you to PayPal.
The number connects you to the scammers, who answer the phone posing as PayPal billing department agents.
4. Scammers “Verify Your Identity”
Once you are on the phone, the scammers claim they need to “verify your identity” before discussing the supposed Springfield Armory invoice.
This is when they start requesting personal information like your full name, date of birth, credit card number, bank account details, Social Security number, or a photo ID.
5. Scammers Steal Your Financial Information
Once you provide your private financial details, the scammers can drain your bank account, make unauthorized credit card charges in your name, steal your identity, and commit other forms of fraud.
The scammers may also try to get you to log into your real PayPal account through a fake site to steal your username and password.
6. Scammers Disappear with Your Information
Now armed with your financial information, the scammers disconnect the call and disappear with your private data. The contact information you called becomes inactive.
You are left with compromised accounts, stolen funds, and no recourse since you voluntarily provided the information to the scammers.
Avoiding the Springfield Armory PayPal Invoice Scam
If you receive a suspicious email about a Springfield Armory purchase from PayPal, do NOT call the included number, provide any information, or click any links. Instead, take these steps:
- Login directly to your real PayPal account to check recent activity and confirm there was no gun purchase.
- Forward the scam email to PayPal at spoof@paypal.com to investigate and shutdown the scam number.
- Report the phishing email to your email provider.
- Delete the scam email immediately and block the sender.
- Never call numbers provided in unexpected finance-related emails. Only call verified numbers listed on real company websites.
- Use strong unique passwords and enable two-factor authentication on your important accounts whenever possible.
With awareness of the techniques used in this scam, you can avoid becoming another victim. Remember, unexpected calls or emails requesting your private information are almost always a scam, even if they claim to be from trusted companies.
What to Do if You Already Called the Scammers
If you already called the billing number and provided any personal or financial information, take these steps right away:
- Contact PayPal to report any unauthorized account activity. Change your password immediately.
- Call your credit card company and bank to report any fraudulent charges or transactions. Cancel any cards that may have been compromised.
- Place fraud alerts on your credit reports to detect any signs of identity theft. Consider signing up for credit monitoring.
- Change passwords on all online accounts that use the same password that may have been compromised.
- File a report with the FTC at IdentityTheft.gov and your local police department. Provide any details about the scam available.
The sooner you take action, the better chance you have of limiting the damage from any stolen information. Never feel embarrassed or afraid to report falling victim to scammers – even savvy people sometimes get fooled.
Raising Awareness to Stop the Springfield Armory PayPal Scam
The more awareness raised about this scam, the harder it will be for scammers to fool victims. You can help fight back and stop this scam by:
- Reporting any scam emails to PayPal so they can be investigated. PayPal may be able to disable scam phone numbers being used as well.
- Making family, friends and contacts in the gun community aware of this scam’s techniques through social media and direct conversations. Knowledge is power against scams.
- Contacting your phone provider to inquire about identifying and blocking frequently spoofed scam numbers. This can disrupt scammers’ operations.
- Filing detailed complaints with the FTC and IC3 to ensure authorities are tracking and responding to the scam.
The Springfield Armory name lures gun enthusiasts in, but recognizing the signs of an invoice scam empowers potential victims to protect their identity and finances. Being vigilant and skeptical whenever asked for your private information will stop scammers in their tracks.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
FAQ: The Springfield Armory PayPal Invoice Email Scam
1. What is the Springfield Armory PayPal invoice scam?
This scam sends a fake PayPal email claiming you purchased a gun or ammo from Springfield Armory. It includes an invoice and number to call about the charge. But it aims to steal your information.
2. How can I recognize the Springfield Armory PayPal scam email?
Look for an invoice for a gun/ammo purchase you didn’t make. Other red flags are grammatical errors, urgent threats to call, and a suspicious sender address.
3. What is the scammers’ goal with this scam?
They want you to call the number so they can pose as PayPal and trick you into giving personal info to steal your identity and drain your bank account.
4. What should I do if I receive this scam email?
Do not call the number or click any links. Log into your real PayPal account to confirm there is no invoice. Forward the email to PayPal and delete it.
5. Are Springfield Armory or PayPal really involved?
No, scammers are only pretending to be from PayPal and Springfield Armory. The real companies are not involved in the scam.
6. What steps should I take if I called the scammers?
Contact PayPal immediately about unauthorized account activity. Call your bank/credit card company about any fraudulent charges. Place fraud alerts with credit bureaus.
7. How can I avoid the Springfield Armory PayPal scam?
Use strong unique passwords everywhere and enable two-factor authentication when possible. Never call or provide information in response to suspicious emails.
8. How can I help stop this scam?
Report any scam emails to PayPal and your email provider. Warn other gun owners about this scam. File detailed complaints with the FTC and IC3.
9. Are there other fake PayPal invoice scams I should know about?
Yes, scams involving fake invoices from eBay, Walmart, Target, Apple, and other major retailers are also common. Always login to PayPal directly to verify any emailed invoices.
10. What should I do if I provided my information to the scammers?
Immediately contact PayPal about unauthorized account access, notify your bank/credit card company about any fraudulent activity, place fraud alerts with credit bureaus, and change any compromised account passwords.
The Bottom Line on the PayPal Springfield Armory Email Scam
This scam preys on fears of identity theft and bank account takeovers. But learning the common red flags of a phishing attempt enables you to recognize the scam before falling for it.
Unexpected finance-related emails and calls should always be met with skepticism. Only call verified contact information listed on real company websites – not numbers provided in random emails.
With caution and awareness, you have the power to outsmart these scammers. If we work together to report these fraudulent emails and numbers, we can eventually shutdown these operations for good.