The FAKE “Windows Defender Subscription” Email Scam Explained
Written by: Thomas Orsolya
Published on:
The internet can be a dangerous place, and one scam that has been making the rounds targets Windows users through a deceptive email. This fraudulent email claims that the recipient has purchased or renewed a Windows Defender subscription, when in reality they have not. Victims who engage with the scammers behind this trick are at risk of having their computers infected with malware, their personal information stolen, or even being tricked into purchasing unwanted tech support services. Read on to learn all about how this Windows Defender subscription email scam operates, how to identify these fraudulent emails, and what you should do if you or someone you know has fallen victim to this con.
This article contains:
An Overview of the Windows Defender Subscription Email Scam
The Windows Defender subscription scam starts with an email informing the recipient that they have purchased or renewed an annual subscription to Windows Defender for $299.99. The email includes fake invoice details to look official, with an order number, date, and basic product information.
However, the email address it is sent from and other details are spoofed to make it appear that the email is from Microsoft or a legitimate vendor. In reality, the whole thing is a scam designed to trick users into calling the number included in the email or clicking on a link.
Once contact is made, the scammers utilize clever social engineering techniques to gain remote access to the victim’s computer. From there, they can install malware, steal personal data and banking information, encrypt files for ransom, and more.
They often pressure and intimidate victims into purchasing unnecessary “security software” or “tech support” services to fix non-existent issues. The scammers bank on taking advantage of users who don’t have enough technical knowledge to realize they are being duped.
Some key things to know about this scam:
It is completely fraudulent, Microsoft does not send unsolicited notices about renewed Windows Defender subscriptions.
The scammers utilize spoofing techniques to make the sender email addresses and domain names appear legitimate at first glance.
The emails contain logos, formatting, and language designed to mimic real subscription notices from Microsoft. This adds legitimacy to the scam for unsuspecting users.
If users call the phone number or click any links, they risk allowing remote access to their computer and exposing personal data.
Once scammers gain access, they use malware, coercion, and deception to steal funds or sensitive information from the victim.
This scam has been around for years, but the scammers continuously evolve their techniques to fool as many people as possible. They rely on prototypical phishing techniques, with mass-spammed emails that seek to gain trust and tempt users to engage. Staying vigilant and identifying the signs of this scam is crucial.
How the Windows Defender Subscription Email Scam Actually Works
The Windows Defender subscription scam is executed in a few key stages once an email is sent out and a target interacts with it:
Stage 1: Sending Fraudulent Emails
The scammers obtain or generate lists of valid email addresses, often through hacking databases, sketchy online lists, or buying the lists from other scammers. They then utilize email spoofing services and apps to mask the sender address. The from name, email address, and reply-to address are all forged to make it seem as if Microsoft sent the email.
Subject lines commonly used include:
Windows Defender Subscription Confirmed
Windows Defender Payment Receipt
Action Required: Validate Your Windows Defender Subscription
Email templates mimic legitimate subscription receipts, with Microsoft logos, formatting, and standard billing details for a fake $299.99 Windows Defender order.
Some emails claim the subscription is expiring and must be renewed, while others say it has already auto-renewed. These emails are spammed out to thousands – or even millions – of recipients. Even just a tiny response rate results in many victims.
Here is how the scam email might look:
Subject: Order Confirmation
INVOICE NUMBER
DATE OF ISSUE 02 February, 2025
PRODUCTS ORDERED (1)
Windows Defender Advanced Threat Protection Firewall & Network Protection (One Year Subscription)
Product Price $299.99
Quantity: 1
ORDER DETAILS
Subtotal $299.99 Tax $0.00 Total $299.99
Dear customer, If You didn’t make this purchase or if you believe an unauthorized person is attempting to access your Microsoft account Call to our customer care representative [phone number] (Toll Free).
Stage 2: Tricking Users to Call or Click
If recipients of the spammed email don’t identify it as a scam, many will call the phone number or click links within the email. The number often appears to be a legitimate Microsoft helpline at first glance. Users call thinking they will get Microsoft support to clear up the supposed errant order.
However, the number actually routes to a scam call center, frequently based overseas. When users click the links, they are typically sent to fake Microsoft lookalike sites controlled by the scammers.
Whether called or clicked, the goal is to get victims to engage with the scammers directly.
Stage 3: Gaining Remote Access
Once users make contact, the social engineering really kicks in. The scammers on the phone are personable, sympathetic sounding professionals. They express concern about the unauthorized order, offering to look into the matter and help cancel it.
To pull this off, they ask to connect remotely to the victim’s computer – often via an app like AnyDesk. This allows full access to the operating system.
If the links in the email were clicked instead, users are walked through downloading remote access apps with the claim it is a Microsoft-verified tool needed to diagnose the issue.
Victims are assured remote access is standard procedure and completely safe. But in reality, it opens the door for the scam.
Stage 4: Installing Malware & Stealing Data
With remote access established, the scam really takes a turn. The scammer pretends to review the system configuration and accounts, then claims they have discovered major security issues that need immediate action.
Some common claims they use include:
Your copy of Windows Defender is expired, putting your system at risk.
Malware or a dangerous virus has infected your computer.
Your IP address is being misused by hackers to access the dark web.
Your identity has been compromised, with hackers accessing your accounts.
Whatever fabricated issue they manufacture, the scammer pressures the victim that they are in huge danger unless they take action immediately.
They often install malware at this point without the user realizing it. Keyloggers, password stealers, remote access trojans, and more are installed to extract sensitive data for later abuse. The scammer may also silently dig through files and accounts looking for financial logins, tax data, and other personal information.
Victims are completely oblivious to the real scam taking place behind the scenes through remote access.
Stage 5: Pressuring Victims for More Funds
Once finished stealing data and compromising the computer, the scammer moves to profit financially from the scam.
They pressure the victim to purchase security software or expensive technical support plans, claiming it is the only way to clean the system or stop hackers from the “issues” discovered. Prices start at $200 or more for multi-year services.
Scammers often request payment in gift cards, cryptocurrency, bank transfers or other hard to reverse methods. Many frightened victims end up relenting and paying, for fear of serious consequences if they don’t act.
This all leads to massive profits for the scammers. On top of fraudulent payments, the stolen personal information taken through malware leads to identity theft and financial fraud as well.
What to Do If You Have Fallen Victim to the Windows Defender Email Scam
If you engaged with the scammers and provided remote access or paid money, don’t panic. Here are the key steps you should take to limit the damage and secure your devices.
Disconnect From the Internet
If the scammer still has remote access to your computer, disconnect it from Wi-Fi immediately. Terminate the remote connection through Task Manager or a force shut down. This cuts off the scammer’s access and prevents further actions.
Scan for Malware
It’s highly likely your system is infected with malware if remote access was given. Download legitimate scanners like Malwarebytes to perform a full system scan. Quarantine or delete anything suspicious found. Also update Windows Defender and run a scan.
Change All Passwords
With malware and remote access, assume your passwords have been compromised. Change passwords immediately for email, financial accounts, and any other sensitive logins. Enable two-factor authentication wherever possible for added security.
Contact Banks and Credit Issuers
Contact your bank and credit/debit card issuers to block potential fraudulent charges or cash transfers. Alert them your credentials may have been stolen. Monitor accounts closely for signs of misuse over the next few months.
Perform a System Restore
If your computer is still not functioning properly, you likely have lingering malware or damage. Wipe the system by performing a full system restore to factory settings. Ensure your data is backed up first.
Report the Incident
Report what happened to cybersecurity officials so they can investigate the scammers. File complaints with the FTC, FBI Internet Crime Complaint Center, and your local authorities. Include as many details as you have, like phone numbers called, email headers, and payment info.
Inform Contacts
Let your friends and contacts in your email or address book know of the scam if the crooks accessed it. This prevents it from spreading further to your network.
Staying vigilant is key. If you receive a suspicious tech support email out of the blue, don’t call or click on anything. Go directly to the site of the company it claims to represent – like Microsoft – to see if it is legitimate. Use common sense when dealing with any unsolicited contacts demanding payment or access to your devices.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
Frequently Asked Questions About the Windows Defender Subscription Scam
1. What is the Windows Defender subscription scam email?
The Windows Defender subscription scam email is a fraudulent email sent out to unsuspecting recipients claiming they have purchased or renewed an annual Windows Defender subscription. The email contains fake invoices and order details for a $299.99 subscription purchase. In reality, it is a scam to trick users into calling the scammers or clicking malicious links. Once engaged, the criminals use social engineering and malware to access victim’s computers, steal data, and siphon funds.
2. How can I identify the Windows Defender subscription scam email?
These fraudulent emails often contain:
Subject lines related to confirming, validating or reviewing a Windows Defender purchase. Microsoft logos and formatting designed to look legitimate. Details for a $299.99 Windows Defender order you never actually placed. Instructions to call a phone number or click a link to cancel, renew, or “fix” issues. Sender addresses and reply-to emails spoofed to mimic Microsoft domains. If an email has these characteristics but you never made the purchase claimed, it is definitely the Windows Defender subscription scam.
3. What happens if I call the phone number or click the link?
The phone numbers go to fraudulent call centers run by the scammers themselves. The links typically direct to fake Microsoft lookalike sites also controlled by the scammers. If you call or click, they will use clever deception and false threats to trick you into providing remote access to your computer. This allows them to stealthily install malware and steal personal data.
4. What do the scammers do once they gain remote access?
Once remote access is established, the scammers pretend to diagnose your system. They will falsely claim to find serious security issues like viruses, expired anti-virus software, or compromised identity theft issues that require immediate payment to resolve. In reality, they are typically installing keyloggers, password stealers, and other malware without your knowledge during this time. They use the malware and direct access to steal banking info, logins, identity details, and other sensitive data.
5. How can I prevent falling victim to this scam?
Never call numbers in unsolicited emails claiming you need to renew a subscription or pay for a service. Don’t click any links in unexpected emails related to anti-virus software or security issues. Contact the company directly through known legitimate channels like their official website to inquire about notifications. Use common sense caution with any outreach demanding payments or access to your device to fix urgent issues you were not already aware of. Carefully verify the full sender address and review linked URLs for any red flags before engaging with an email.
6. What should I do if I already provided remote access or paid money to the scammers?
If you already fell victim, immediately disconnect your device from the internet and force restart it to sever the remote connection. Run anti-malware scans, change all account passwords, monitor financial accounts for fraud, and report the incident to authorities. Alert your contacts of the scam if the crooks accessed your address book. A full system restore may be required if malware persists.
7. How can I report this scam to help prevent others from being victimized?
Reporting this scam to authorities can help get the fraudulent phone numbers and emails shut down. File detailed complaints with the FTC, FBI Internet Crime Complaint Center, Microsoft, and your local law enforcement. Include as many specifics as possible like phone numbers, email headers, bitcoin wallets, etc. to aid investigations.
The Bottom Line on the Windows Defender Subscription Email Scam
This scam has swindled countless unsuspecting individuals who didn’t realize they were being targeted by fraudsters. The emails lookconvincing, and the scammers seem professional once contact is made. It’s easy to see how so many end up falling for the con.
If an unexpected email claims you purchased or renewed an expensive subscription you don’t recall, exercise extreme caution. The Windows Defender scam preys on lack of cybersecurity knowledge, using system warnings and high pressure tactics to extort victims. Be skeptical of any unsolicited messages demanding immediate payment or offering fixes to issues you aren’t already aware of.
How to Stay Safe Online
Here are 10 basic security tips to help you avoid malware and protect your device:
Use a good antivirus and keep it up-to-date.
It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.
Keep software and operating systems up-to-date.
Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.
Be careful when installing programs and apps.
Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."
Install an ad blocker.
Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.
Be careful what you download.
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.
Be alert for people trying to trick you.
Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.
Back up your data.
Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.
Choose strong passwords.
Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.
Be careful where you click.
Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.
Don't use pirated software.
Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.
To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.