{"id":1214,"date":"2012-10-11T08:37:00","date_gmt":"2012-10-11T08:37:00","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/"},"modified":"2023-05-15T23:01:47","modified_gmt":"2023-05-16T06:01:47","slug":"fraud-alert-microsoft-services-agreement-email-scam","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/","title":{"rendered":"Fraud alert: Microsoft Services Agreement email scam"},"content":{"rendered":"

We\u2019ve received reports of a recent email scam that spoofs the Microsoft Services Agreement.<\/p>\n

The scam email message replaces legitimate links in the agreement with links that can compromise your computer when clicked. If you receive mail that looks like the real agreement or asks you to click a suspicious link or to provide personal information, delete the message or report the scam<\/a>.<\/p>\n

<\/div>\n","protected":false},"excerpt":{"rendered":"

We\u2019ve received reports of a recent email scam that spoofs the Microsoft Services Agreement. The scam email message replaces legitimate links in the agreement with links that can compromise your computer when clicked. If you receive mail that looks like the real agreement or asks you to click a suspicious link or to provide personal […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3671],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1879],"class_list":["post-1214","post","type-post","status-publish","format-standard","hentry","content-type-news","topic-email-security","tag-microsoft-security-insights"],"yoast_head":"\nFraud alert: Microsoft Services Agreement email scam | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud alert: Microsoft Services Agreement email scam | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve received reports of a recent email scam that spoofs the Microsoft Services Agreement. The scam email message replaces legitimate links in the agreement with links that can compromise your computer when clicked. If you receive mail that looks like the real agreement or asks you to click a suspicious link or to provide personal […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-11T08:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:01:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Eve Blakemore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eve Blakemore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"<1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eveblakemore\/\",\"@type\":\"Person\",\"@name\":\"Eve Blakemore\"}],\"headline\":\"Fraud alert: Microsoft Services Agreement email scam\",\"datePublished\":\"2012-10-11T08:37:00+00:00\",\"dateModified\":\"2023-05-16T06:01:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\"},\"wordCount\":71,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\",\"name\":\"Fraud alert: Microsoft Services Agreement email scam | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"datePublished\":\"2012-10-11T08:37:00+00:00\",\"dateModified\":\"2023-05-16T06:01:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud alert: Microsoft Services Agreement email scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fraud alert: Microsoft Services Agreement email scam | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/","og_locale":"en_US","og_type":"article","og_title":"Fraud alert: Microsoft Services Agreement email scam | Microsoft Security Blog","og_description":"We\u2019ve received reports of a recent email scam that spoofs the Microsoft Services Agreement. The scam email message replaces legitimate links in the agreement with links that can compromise your computer when clicked. If you receive mail that looks like the real agreement or asks you to click a suspicious link or to provide personal […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/","og_site_name":"Microsoft Security Blog","article_published_time":"2012-10-11T08:37:00+00:00","article_modified_time":"2023-05-16T06:01:47+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Eve Blakemore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eve Blakemore","Est. reading time":"<1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eveblakemore\/","@type":"Person","@name":"Eve Blakemore"}],"headline":"Fraud alert: Microsoft Services Agreement email scam","datePublished":"2012-10-11T08:37:00+00:00","dateModified":"2023-05-16T06:01:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/"},"wordCount":71,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/","name":"Fraud alert: Microsoft Services Agreement email scam | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"datePublished":"2012-10-11T08:37:00+00:00","dateModified":"2023-05-16T06:01:47+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/10\/11\/fraud-alert-microsoft-services-agreement-email-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Fraud alert: Microsoft Services Agreement email scam"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/1214"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=1214"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/1214\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=1214"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=1214"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=1214"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=1214"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=1214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=1214"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=1214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}