{"id":103304,"date":"2025-02-28T12:02:35","date_gmt":"2025-02-28T20:02:35","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103304"},"modified":"2025-02-28T12:02:35","modified_gmt":"2025-02-28T20:02:35","slug":"apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/","title":{"rendered":"\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-103307\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>Throughout the past couple of years, we&#8217;ve continued to see more and more scams that leverage fake invoices or payment requests. Scammers often send them via legitimate services, such as Intuit QuickBooks, PayPal, Venmo, or Docusign to bypass e-mail spam filters.<\/p>\n<p>The latest round of scams uses alleged payment requests or subscription purchases. Scammers may send these scams via one of the aforementioned services, or Payoneer, or even directly from Microsoft.<\/p>\n<p>Here&#8217;s how you can recognize, avoid, and report these scams.<\/p>\n<h3>&#8220;Apple Inc sent you a payment request&#8221; fraud e-mail sent via Payoneer<\/h3>\n<p>First, let&#8217;s take a look at what a fake invoice or money request sent via Payoneer looks like.<\/p>\n<div id=\"attachment_103312\" style=\"width: 1061px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-103312\" loading=\"lazy\" class=\"wp-image-103312 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/Apple-Inc-sent-you-a-payment-request-Payoneer-email-scam.jpg\" alt=\"Apple Inc sent you a payment request - Payoneer e-mail scam\" width=\"1051\" height=\"1179\" \/><p id=\"caption-attachment-103312\" class=\"wp-caption-text\">&#8220;Apple Inc is requesting a payment&#8230; Here are the details of the payment request&#8221; fraudulent e-mail<\/p><\/div>\n<p>If you get a payment request via Payoneer, the From address will be NoReply@payoneer.com and the subject will be something like &#8220;Apple Inc sent you a payment request.&#8221; But that doesn&#8217;t mean that the invoice or money request is legitimate; scammers often leverage real services like Payoneer to send scams.<\/p>\n<p>First of all, if you don&#8217;t have any business relationship with the person or organization who allegedly sent the invoice, that should be your first red flag. Second, the amount is sometimes (but not always) scarily high; the main point of this is to cause the recipient to panic and act rashly.<\/p>\n<p>And third, pay close attention to the &#8220;Description&#8221; section. In the example above, the note from the payment requestor says, &#8220;Your iPhone 16 Pro Max order is processed via PayPal. Due to security updates, transactions now use Payoneer. Contact PayPal at 1(888) 651-[redacted] for assistance or Payoneer to track your order.&#8221; The phone number belongs to the scammer who sent the message\u2014NOT to Payoneer.<\/p>\n<h3>&#8220;Microsoft subscription purchase confirmation&#8221; fraud e-mail<\/h3>\n<p>Next, let&#8217;s take a look at another scam that might on the surface appear to be very different, sent directly via Microsoft. In a moment, we&#8217;ll explain how these two scams are related.<\/p>\n<div id=\"attachment_103313\" style=\"width: 1060px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-103313\" loading=\"lazy\" class=\"wp-image-103313 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/Microsoft-subscription-purchase-confirmation-details-email-scam.jpg\" alt=\"Microsoft subscription purchase confirmation - email scam\" width=\"1050\" height=\"1220\" \/><p id=\"caption-attachment-103313\" class=\"wp-caption-text\">&#8220;Details of your subscription purchase [from] Microsoft 365 admin center\u2026 Pay now&#8221; fraudulent e-mail<\/p><\/div>In this case, the subject line says simply, &#8220;Microsoft subscription purchase confirmation.&#8221; A separate e-mail, sent around the same time, has the subject line, &#8220;Get started with your new Power BI Premium Per User subscription.&#8221; The From address for both emails is microsoft-noreply@microsoft.com.<\/p>\n<p>How can you tell that this e-mail is fraudulent, if it really did come from Microsoft? Pay close attention to the supposed &#8220;Organization name,&#8221; which instead contains a ridiculously long and deceptive message:<\/p>\n<blockquote><p>Organization name: (Microsoft Corporation) .Your subscription has been successfully purchased for 689.89 USD using your checking account. If you did not authorize this transaction, please call 1(888) 651-[redacted] to request a refund.<\/p><\/blockquote>\n<p>Like with the Payoneer variation of the scam, this phone number won&#8217;t actually go to a legitimate customer support center. Rather, the scammer operates these phone numbers.<\/p>\n<h3>What is the common link between these scam e-mails?<\/h3>\n<p>While it might not be immediately obvious, both of these fraudulent e-mails are related and come from the same ring of fraudsters.<\/p>\n<p>How can you tell? Take a look at the &#8220;To&#8221; e-mail address for both e-mails; it&#8217;s the same address, ending in @[redacted].onmicrosoft.com. What does this mean? It means that the e-mail address where you&#8217;re receiving these scam messages has been added to an e-mail distribution list group, as part of a Microsoft Office 365 for Business organization operated by the scammer.<\/p>\n<p>A large number of people\u2014including potential victims whose external e-mail addresses have nothing to do with the &#8220;business&#8221; domain set up by the scammers\u2014can potentially be added to such an e-mail spam list.<\/p>\n<p>Eventually, when Microsoft discovers that the Office 365 business domain is being used for fraud, they&#8217;ll likely shut it down; however, it may take some time before that happens. In the mean time, recipients of these scam e-mails may fall for some of the payment requests and get tricked into sending the scammers money. After Microsoft eventually shuts down the business domain, the scammers will simply create a new one and start all over again.<a name=\"report\"><\/a><\/p>\n<h3>How can I report these scammers?<\/h3>\n<p>Here&#8217;s a quick chart of some legitimate organizations that are often exploited to send fraudulent e-mails. If you get fake invoices, payment requests, or subscription purchases that appear to have been sent by one of these companies, you can forward the e-mail to the relevant addresses below to report the scam:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Impersonated Company<\/strong><\/td>\n<td><strong>Forward Scams To<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Docusign<\/td>\n<td>security@docusign.com<\/td>\n<\/tr>\n<tr>\n<td>Intuit QuickBooks<\/td>\n<td>security@intuit.com<\/td>\n<\/tr>\n<tr>\n<td>Microsoft<\/td>\n<td>secure@microsoft.com<\/td>\n<\/tr>\n<tr>\n<td>Payoneer<\/td>\n<td>CustomerServiceManager@Payoneer.com<\/td>\n<\/tr>\n<tr>\n<td>PayPal<\/td>\n<td>phishing@paypal.com<\/td>\n<\/tr>\n<tr>\n<td>Venmo<\/td>\n<td>phishing@venmo.com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>It&#8217;s also a good idea to <strong>forward scam and phishing e-mails<\/strong> to the U.S. Federal Trade Commission (<strong>FTC<\/strong>) at <a href=\"mailto:spam@uce.gov\">spam@uce.gov<\/a>. Additionally, you can CC the Anti-Phishing Working Group at <a href=\"mailto:reportphishing@antiphishing.org\">reportphishing@antiphishing.org<\/a>. The <strong>APWG<\/strong> is a coalition of international law enforcement agencies and tech companies that work together to take down identity thieves and fraudsters.<\/p>\n<p><strong>If you believe you&#8217;ve fallen victim<\/strong> to one of these scams, inform the FTC; go to <a href=\"https:\/\/reportfraud.ftc.gov\/\" target=\"_blank\" rel=\"noopener\">ReportFraud.ftc.gov<\/a> and fill out the form. You may also find it helpful to review Intego&#8217;s <a href=\"https:\/\/www.youtube.com\/watch?v=fGCiDTlyHME\" target=\"_blank\" rel=\"noopener\">video about how to report scams<\/a> before submitting your report.<a name=\"learnmore\"><\/a><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/fGCiDTlyHME?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We&#8217;ve previously covered tons of similar <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/scam\/\">scams<\/a>; check out these articles for additional details:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\">How to spot fake Apple security alerts via text, phone, email, or web<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-fake-package-delivery-texts-and-e-mails-heres-what-to-look-for\/\">Beware of fake package delivery texts and e-mails! Here\u2019s what to look for<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/money-request-and-invoice-scams-via-paypal-venmo-and-docusign\/\">Money request and invoice scams via PayPal, Venmo, and Docusign<\/a> (Dec 2024)<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/geek-squad-email-scam-sends-fake-invoices-using-housecallpro-servers\/\">Fake \u201cGeek Squad\u201d invoice scam, now using Housecall Pro servers<\/a> (Jan 2024)<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-invoice-scams-norton-mcafee-paypal-and-more\/\">Fake invoice scams: Norton, McAfee, PayPal, and more<\/a> (2023)<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-to-beware-of\/\">Top 10 online scams to beware of: from malvertising to deepfake kidnappings<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.<\/p>\n","protected":false},"author":14,"featured_media":103309,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4716,4039,116,2380],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-28T20:02:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Scam email e-mail letter emoji generic\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/\",\"name\":\"\\u201cApple Inc sent you a payment request\\u201d Payoneer invoices; other Microsoft-enabled scams - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#primaryimage\"},\"datePublished\":\"2025-02-28T20:02:35+00:00\",\"dateModified\":\"2025-02-28T20:02:35+00:00\",\"description\":\"Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u201cApple Inc sent you a payment request\\u201d Payoneer invoices; other Microsoft-enabled scams\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"\\u201cApple Inc sent you a payment request\\u201d Payoneer invoices; other Microsoft-enabled scams\",\"datePublished\":\"2025-02-28T20:02:35+00:00\",\"dateModified\":\"2025-02-28T20:02:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#webpage\"},\"wordCount\":1080,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg\",\"keywords\":[\"Invoice Scam\",\"Online Scams\",\"Scam\",\"Support Scam\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/","og_locale":"en_US","og_type":"article","og_title":"\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams - The Mac Security Blog","og_description":"Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-02-28T20:02:35+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg","width":400,"height":260,"caption":"Scam email e-mail letter emoji generic"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/","name":"\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#primaryimage"},"datePublished":"2025-02-28T20:02:35+00:00","dateModified":"2025-02-28T20:02:35+00:00","description":"Scammers are sending fake payment requests via Payoneer and Microsoft. Here is what you need to know to avoid getting scammed through fraudulent e-mails like these.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams","datePublished":"2025-02-28T20:02:35+00:00","dateModified":"2025-02-28T20:02:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#webpage"},"wordCount":1080,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg","keywords":["Invoice Scam","Online Scams","Scam","Support Scam"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/02\/scam-email-letter-emoji-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qSc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103304"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103304"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103304\/revisions"}],"predecessor-version":[{"id":103321,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103304\/revisions\/103321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/103309"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}