Spotting scammy emails

Let’s say you get an email about a charge to your credit card for something you aren’t expecting or don’t want. Your first instinct may be to immediately call the company or respond to the email and to stop the payment. Scammers know that, and are taking advantage of it in a new phishing scheme.

People tell us they’re getting emails that look like they’re from Norton, a company that sells antivirus and anti-malware software. (Tip: the emails are NOT from Norton.) The emails say you’ve been (or are about to be) charged for a Norton product — maybe an auto renewal or new order. If this is a mistake, the email says, you should call immediately. (Tip: don’t.)

 Scam Email, Not Really from Norton. Learn more: ftc.gov/imposter. Report tech support scams at: ReportFraud.ftc.gov. Image of an email. From: [redacted]. Date: Tue, Feb 9, 2021. Subject: BILLING DEPARTMENT. To: [redacted]. Body of email: 9999 within one business day when you are in front of your computer. Thanks & Regards, Norton (TM) Billing Team." Image of Norton logo with yellow circle and black checkmark." width="" height="" />

If you call, you’ll be connected to a scammer. Some scammers might ask you to “verify” your credit card information, while others might say they need your password to remote into your computer so they can remove the Norton program. But if you let them, they could install malware, block you from getting to your own files, and sell you worthless services.

If you get an email or text you’re not sure about:

And if you do get a fake email like this, help your community by reporting it to the FTC at ReportFraud.ftc.gov.

Search Terms Comments have been turned off for this consumer alert.

Read Our Privacy Act Statement

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.

Read Our Comment Policy

The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.

We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.