Why would Microsoft bother with this? Whenever they need to spam customers, they simply do it through the Start menu.To prevent spam filters from blocking the address, the company advises users to add it to allow lists.
Abusing Microsoft’s reputation may make scam harder to spot.
Unlikely. The spammers are probably using a compromised environment and not their own Power BI premium instance. These days, it's probably more than one compromised environment.You'd think that reporting this to Microsoft would have an impact.
In order to send reports to external email addresses (outside of your organization) its required for Power BI to be backed by a premium instance (starting at 5k/mo) or Microsoft Fabric. I would assume there is some paper trail of payment that would be involved in the scammers getting the environment setup so they could do this.
Those are just minor details. The real giveaway that this is fake is that a person answered the call.I'll be that guy: the errors in this message scream that this is a scam.
Billing in the subject is misspelled.
The message is from Microsoft about a Norton subscription.
The grammar is atrocious - let's capitalize each word!
Subscribed by a user/email with zero connection to Microsoft or Norton.
Does this even have a certificate from Microsoft?

To the author's credit, they did mention at the end of the article that such scams are easy to spot for experienced users.I'll be that guy: the errors in this message scream that this is a scam.
Billing in the subject is misspelled.
The message is from Microsoft about a Norton subscription.
The grammar is atrocious - let's capitalize each word!
Subscribed by a user/email with zero connection to Microsoft or Norton.
Does this even have a certificate from Microsoft?
As the person who sent in this tip to begin with, my real concern is the existence of the attack vector, rather than the particular scam. If this scam operation has the ability to send social engineering scams literally from Microsoft’s domain without spoofing it, that’s pretty concerning regardless of how amateurish a particular attack may be/appear.I'll be that guy: the errors in this message scream that this is a scam.
Billing in the subject is misspelled.
The message is from Microsoft about a Norton subscription.
The grammar is atrocious - let's capitalize each word!
Subscribed by a user/email with zero connection to Microsoft or Norton.
Does this even have a certificate from Microsoft?
Abusing Microsoft’s reputation may make scam harder to spot.
You're forgetting that you, like most other Ars readers, are the exception, not the rule, when it comes to stuff like this. You don't know a single person with diminished cognition, neurodiversity or other conditions that make them more susceptible than you? Please direct your criticism at the powers making these scams possible, not potential victims.I'll be that guy: the errors in this message scream that this is a scam.
Billing in the subject is misspelled.
The message is from Microsoft about a Norton subscription.
The grammar is atrocious - let's capitalize each word!
Subscribed by a user/email with zero connection to Microsoft or Norton.
Does this even have a certificate from Microsoft?
Or just tired and stressed.You're forgetting that you, like most other Ars readers, are the exception, not the rule, when it comes to stuff like this. You don't know a single person with diminished cognition, neurodiversity or other conditions that make them more susceptible than you? Please direct your criticism at the powers making these scams possible, not potential victims.
Likely they are sending these from compromised corporate instances. And I bet reporting is being handled by AI.You'd think that reporting this to Microsoft would have an impact.
In order to send reports to external email addresses (outside of your organization) it’s required for Power BI to be backed by a premium instance (starting at 5k/mo) or Microsoft Fabric. I would assume there is some paper trail of payment that would be involved in the scammers getting the environment setup so they could do this.
"Trusted"? I have not trusted a Microsoft sender in decades. For a while all their legit emails were bouncing off my school's RDNS fillter (like MS didn't know how to DNS). Then there is the Outlook and Live hoipolloi products.mail is sent from a trusted Microsoft domain
That's on purpose so that scammers don't have to deal with users that can spot scams. It's the same reason Nigerian prince emails are so wonky.I'll be that guy: the errors in this message scream that this is a scam.
Billing in the subject is misspelled.
The message is from Microsoft about a Norton subscription.
The grammar is atrocious - let's capitalize each word!
Subscribed by a user/email with zero connection to Microsoft or Norton.
Does this even have a certificate from Microsoft?
Been getting these since Monday to my work (O365 environment) email account.
Today's ones dropped mention of McAfee. None of them have had any egregious mispellings. Random email address cited is the main clue this is dodgy (and Paypal, cause I don't use that for work). Also a local NZ phone number, and MS referring me to Paypal support line* are weird. Some ugly layout too.
* EDIT: earlier versions, just noticed the later ones as pictured below are a lot better grammar. Their AI is learning.
Old version text:
McAfee Received Payment From your PayPal help desk support: +64 3 563-3574
Dear Customer, We have noticed an unauthorized transaction from your PayPal account . If this Transaction was not made by you, please call us +64 3 563-3574 to cancel this order. Otherwise, your $599.99 NZD will be charged today.
The main clue for me would be including the customer support number in the header. That's obviously because they want you to contact it when it should be hidden and hard tto find like all support is when you need it or want it.
I saw the errors and they immediately stood out. But last year I also got half way through writing an angry reply to an email about a new 'no disposable bottles in conferences' policy from my university before realizing it was part of their anti phishing campaign. It's a million monkeys, at least one will get you, more if you think you will catch them all.You're forgetting that you, like most other Ars readers, are the exception, not the rule, when it comes to stuff like this. You don't know a single person with diminished cognition, neurodiversity or other conditions that make them more susceptible than you? Please direct your criticism at the powers making these scams possible, not potential victims.
So PowerBI actually is a free2play and pay2win setup for scammers...You'd think that reporting this to Microsoft would have an impact.
In order to send reports to external email addresses (outside of your organization) its required for Power BI to be backed by a premium instance (starting at 5k/mo) or Microsoft Fabric.
Congratulations: you managed to identify a scam message displayed inside an article about scams.I'll be that guy: the errors in this message scream that this is a scam.
Billing in the subject is misspelled.
The message is from Microsoft about a Norton subscription.
The grammar is atrocious - let's capitalize each word!
Subscribed by a user/email with zero connection to Microsoft or Norton.
Does this even have a certificate from Microsoft?
Honestly, I think just using Microsoft's reputation truthfully makes a scam harder to spot. The only reason to think this is fake is that it's not pushing Copilot.
Not sure why this is being upvoted as it is totally incorrect.You'd think that reporting this to Microsoft would have an impact.
In order to send reports to external email addresses (outside of your organization) its required for Power BI to be backed by a premium instance (starting at 5k/mo) or Microsoft Fabric. I would assume there is some paper trail of payment that would be involved in the scammers getting the environment setup so they could do this.