1-888-300-4810
Serving Greater Vancouver and the Fraser Valley
info@tsgcs.ca

Blog Details

Sage50 Phishing Scam

Sage50 “Auto-Renewal” Email Scam: The “Your Database Is Corrupt” Phone Trick We’re Seeing More Often!
Man at office computer reviewing a suspicious Sage 50 auto-renewal email phishing scam notification on his screen.
A small business owner reviews a fake Sage 50 auto-renewal email, a common phishing scam targeting accounting software users and putting company data at risk.

We recently helped a client who received a very convincing “Sage auto-renewal notification” email. At first glance it looked normal: branding, renewal date, a link to “update your credit card,” and a phone number to call for questions.

 

But two things didn’t add up:

  1. The layout was slightly “off” compared to what Sage typically sends.
  2. The phone number didn’t match official Sage support channels (after careful checking on our side).

That small mismatch is exactly what these threat actors are counting on.

This is the exact image that appears in the email. (Names, numbers, and dates have been changed. except for the Phone Number at the bottom of the Ad).
This is to bring attention to the Actual Phone Number used in the Phishing Scam.

How the scam works (in plain English)

This is a callback / phone-based phishing scam dressed up as a billing notice.
Here’s the typical flow we’re seeing (Sage and QuickBooks themes are being used):

  1. Victim receives a “renewal / billing / subscription” email that looks legitimate.
  2. The email pushes a phone number (“Call support to fix billing / avoid interruption / change plan”).
  3. When the victim calls, the “support rep” creates urgency:
    • “Your Sage50 data is corrupted.”
    • “Your account is inactive.”
    • “We need to run diagnostics / install a tool / repair files.”
  4. The scammer then backs it up with manufactured “evidence” to sound technical and credible.
The fake “evidence” they send looks technical on purpose
In this case, the attackers included a document styled like a Sage data verification log. It contains scary-looking claims like:
  • “Database Engine Reported an Error” and “Error Code 6069.. dB code 103..”
  • “Data Files Corrupted” percentages (e.g., 41%, 34%, etc.)
  • A timestamp to make it feel “real”
They also used a “rep identity” / internal-extension style sheet:
  • Name: Kevin
  • “EXT ID: 1432”
  • Multiple phone numbers listed as “Technical Dep”
  • A made-up sounding “subscription” line (“1 Year Data Protection Service Plan”)
None of that proves anything about your Sage data. It’s theater—meant to push you into letting them “fix” something. 


Red flags your team can spot in under 30 seconds
  • A billing email that tells you to call a number (instead of using your known vendor portal/account contact).
  • Urgency + fear: “account inactive,” “data corruption,” “immediate action required.”
  • “Proof” that’s just a text log with generic wording and dramatic percentages.
  • A “support agent” with an extension and multiple phone numbers that aren’t traceable to official vendor resources.
  • They want remote access or want you to install anything “to repair the data.”

What to do if you receive one of these emails
Do this:
  1. Don’t call the number in the email.
  2. Don’t click “update card” links unless you’re already signed into your known vendor portal (typed manually / bookmarked).
  3. Forward the email to your IT provider (or internal IT) and ask them to validate it.
  4. Verify billing using a trusted method:
    • Use your known Sage/Intuit portal login/bookmark
    • Or call a number from a prior invoice/contract you already trust
Do not do this:
  • Don’t “just call to confirm.” That’s the trap.
  • Don’t let anyone “repair” your Sage/QuickBooks data over the phone.

If someone already called them (damage control)
If a staff member already called and interacted with the “rep,” treat it like a security incident:
  • Disconnect the PC from the network (Wi-Fi off / unplug Ethernet) if remote access was granted.
  • Tell IT exactly what happened: what was installed, what was clicked, what access was given.
  • Change passwords (email first, then accounting software, then anything reused).
  • Check for remote access tools and persistence (services, startup items, scheduled tasks).
  • Run a real cleanup & verification process – see Virus Malware & Spyware Removal
  • Confirm backs are safe & recoverable (this matters if anything escalates – see Off-Site Data Backup .
  • Review financial/banking activity if any “billing update” was attempted.

How we help clients prevent this (without relying on luck)
At TSG Computer Services, we focus on keeping these scams from turning into downtime:
Want a simple internal policy that stop this fast?
Rule #1: NOBODY calls vendor phone numbers found in emails. If you are unsure, forward it to use for verifications before anyone clicks or calls. To explore options, browse TSGCS Services, or Contact Us to validate a suspicious email and put protections in place.
 

Free Tools

Leave A Comment

TSG