Issue: How to block "Microsoft account unusual sign-in activity” phising scam?
Hi guys. I’m a bit concerned if I have recently received a genuine Microsoft alert on my Outlook account or not. The message says “Unusual sign-in Activity.” Although I see Microsoft account team as a sender, the generated URL address seems suspicious. Besides, the location of the sender is Namibia, which also seems questionable for me. Finally, it’s stated that to save my personal information, my Outlook account will be temporarily blocked, so I should not be able to send or receive emails, BUT I do send emails and receive them. I tried that and received a confirmation from my colleagues that they have just received an email from my account. Could you please help me?
“Microsoft account unusual sign-in activity” is an email letter which informs about a suspicious sing-in to the Outlook account. In most cases, such emails are legitimate and useful to protect you from hackers. However, cybercriminals invented a phishing technique to trick novice users into giving their credentials — they sent fake letter that look extremely similar to the legitimate ones.
“Microsoft account unusual sign-in activity” scam relies on the credulous people who do not pay attention to details. Users should always double check the email address before agreeing to do what is asked or clicking on any contents attached to the letter. Criminals use addresses that are similar but slightly different from the legitimate ones.
Furthermore, you can always contact Microsoft Support directly on their official website, if you wonder whether “Microsoft account unusual sign-in activity” alert is safe or legitimate. Additionally, Outlook often marks safe email addresses with the green shield icon. So, if you cannot see one, do NOT open the email.
The scam message says:
From: Outlook Administrator [email protected]
Date: March 11, 2017 at 8:46:48 AM EDT
Subject: Microsoft account unusual sign-in activity
Unusual Activity Detected
We detected something unusual about a recent activity to the Microsoft account. To help keep you safe, we required an extra security challenge. You will need to verify your Microsoft email account below to confirm that the recent activity was yours and to regain access and enjoy our unlimited service.
Using a shared computer to access your account.
Logging in your microsoft account from blacklisted IP.
Not logging off your account after usage.
Thanks for using your Microsoft account to bring the people who matter most together in one place. You can change your connection settings anytime and find more ways to connect at businnesmn.com/content/themes/ fourteen/genericons/font/dirrect.php.
See you online,
The Microsoft team
Usually, the link indicated in fake “Microsoft account unusual sign-in activity” message redirects to a counterfeit log-in page to trick you into providing your logins and passwords. Also, there is a possibility that the link can trigger an automatic installation of malware on your system. So stay away from the content placed in the email!
Finally, once you are sure that “Microsoft account unusual sign-in activity” is a phishing scam, you must protect your email inbox from such fraudulent and potentially dangerous messages. Luckily, Outlook provides a feature to block senders if they are dangerous or annoying.
Instructions showing how to block “Microsoft account unusual sign-in activity” phishing scam on Outlook
In case you have encountered “Microsoft account unusual sign-in activity” phishing messages on Outlook, you can protect your system two ways. The first one is to immediately get a professional malware removal software if you still don't have one. Our top pick would be ReimageMac Washing Machine X9.
Robust antivirus program is designed to protect your computer from malicious emails that aim to infect your system with malware or lead to fake login sites. Thus, the security software will warn you when criminals are trying to swindle information, money or other sensible data from you.
Another method is to assign the sender of “Microsoft account unusual sign-in activity” email to the blocked list. However, keep in mind that this technique does not protect you against other phishing scams that might occur right after you get rid of this one. Thus, it would be wise to get a security software.
Guide showing how to remove “Microsoft account unusual sign-in activity” phishing scam from Outlook:
- Once you change Outlook’s password, sign-in to your account;
- Click the gear icon on the upper right corner of the Outlook homepage;
- Press Options.
- Click Safe and blocked senders;
- Select Blocked senders and enter the email address that you want to block in the address bar;
- Click Add to list.
If these steps did not help to fix “Microsoft account unusual sign-in activity” scam, please contact a genuine Microsoft account team for additional assistance.
Optimize your system and make it work more efficiently
Optimize your system now! If you don't want to inspect your computer manually and struggle with trying to find issues that are slowing it down, you can use optimization software listed below. All these solutions have been tested by ugetfix.com team to be sure that they help improve the system. To optimize your computer with only one click, select one of these tools:
Access geo-restricted video content with a VPN
Private Internet Access is a VPN that can prevent your Internet Service Provider, the government, and third-parties from tracking your online and allow you to stay completely anonymous. The software provides dedicated servers for torrenting and streaming, ensuring optimal performance and not slowing you down. You can also bypass geo-restrictions and view such services as Netflix, BBC, Disney+, and other popular streaming services without limitations, regardless of where you are.
Don’t pay ransomware authors – use alternative data recovery options
Malware attacks, particularly ransomware, are by far the biggest danger to your pictures, videos, work, or school files. Since cybercriminals use a robust encryption algorithm to lock data, it can no longer be used until a ransom in bitcoin is paid. Instead of paying hackers, you should first try to use alternative recovery methods that could help you to retrieve at least some portion of the lost data. Otherwise, you could also lose your money, along with the files. One of the best tools that could restore at least some of the encrypted files – Data Recovery Pro.