Threat Intelligence

Portuguese Invoice Fraud with Same-Day Due Date and Reply-To Mismatch

Written by Audian Paxson | Dec 5, 2025 5:30:00 AM
TL;DR A Portuguese-language email from lawrenceruiz041@hotmail[.]com passed SPF, DKIM, and DMARC via Hotmail infrastructure. The Reply-To was set to gearardtrentnt5vyux@hotmail[.]com. The message referenced invoice NF 2678 with a corrected payment amount and same-day due date. No links, no attachments. The sending entity could not be verified.

What Happened

A Portuguese-language email arrived from lawrenceruiz041@hotmail[.]com requesting payment on invoice NF 2678. The message stated that the previously communicated amount had been corrected and that the updated amount was now due. The due date was the same day the email was sent.

SPF passed. DKIM passed. DMARC passed. The email was sent through legitimate Hotmail infrastructure, and every authentication check confirmed that the message originated from an authorized Microsoft server.

The Reply-To header was set to gearardtrentnt5vyux@hotmail[.]com, a different address from the sender. Any reply to this email would be silently routed to the Reply-To address rather than the apparent sender. The Reply-To address follows a pattern common to throwaway accounts: a name fragment combined with random characters.

The email contained no links, no attachments, and no embedded images. The entire payload was text. The sending entity referenced in the email body could not be verified through Portuguese business registries or commercial databases.

Why It Matters

Text-only invoice fraud is one of the most difficult attack types for automated security systems to detect. There is no URL to scan, no file to sandbox, and no embedded content to analyze. The email authentication stack confirms that the message came from Hotmail, which it did. Every technical indicator is clean.

The Reply-To mismatch is the primary technical signal. When the From address and Reply-To address differ, it means the attacker wants responses directed to a different mailbox. In a legitimate business context, this is unusual. Vendors sending invoices want replies to come back to the same address. The mismatch is a silent diversion that most recipients will never notice because email clients display the From address, not the Reply-To, in the inbox view.

The same-day due date applies maximum urgency pressure. Combined with the corrected amount framing, the email creates a scenario where the recipient believes they have already been invoiced, the amount has changed, and payment is overdue the moment they read the message. This combination is designed to bypass the normal verification workflow that gateway-only security cannot replicate.

The Portuguese language targets a specific recipient demographic and reduces the likelihood that English-language-focused security teams will manually review the message content.

How IRONSCALES Caught It

Adaptive AI email security identified the Reply-To mismatch as the primary risk signal and combined it with the consumer email provider origin, unverifiable sender entity, and same-day payment urgency to classify the message as HIGH risk. The absence of any prior communication from this sender to the target organization reinforced the behavioral assessment.

Community intelligence confirmed that similar Portuguese-language invoice fraud emails with the same Reply-To pattern were reaching multiple organizations across the IRONSCALES network.

See Your Risk. Run a free phishing simulation to discover whether text-only invoice fraud would reach your finance team today.

Indicators of Compromise

IndicatorTypeValue
Case IDInternal46941b41cf8c6a1496c048e3d995943a
Sender EmailEmaillawrenceruiz041@hotmail[.]com
Reply-To EmailEmailgearardtrentnt5vyux@hotmail[.]com
Invoice ReferenceFinancialNF 2678
LanguageContentPortuguese
Due DateUrgencySame-day
PayloadContentText-only (no links, no attachments)
CompanyIdentityUnverifiable
SPFAuthenticationpass
DKIMAuthenticationpass
DMARCAuthenticationpass

MITRE ATT&CK Mapping

TacticTechniqueIDNotes
Initial AccessPhishingT1566Text-only invoice fraud, no payload
Resource DevelopmentEstablish Accounts: Email AccountsT1585.002Throwaway Hotmail accounts for sender and Reply-To
Defense EvasionMasqueradingT1036Reply-To diversion to separate mailbox
ImpactFinancial TheftT1657Same-day due date payment demand
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.