Got it, thanks for clarifying.
If the email truly came from microsoft-noreply@microsoft.com, that’s the official domain Microsoft uses for automated notifications, but spoofing can still make it appear that way in the display name.
Since you already marked it as phishing, you can’t retrieve the full header now, but the old card detail is the biggest clue, it suggests the attacker had access to previously leaked payment info and is using it to make the email look authentic.
Real Microsoft billing emails will never ask you to update payment through a link in the email; they’ll direct you to sign in at account.microsoft.com.
At this point, the best steps are to confirm your subscription status in your account, review recent sign-ins under Microsoft Security, and make sure MFA is enabled on your mother’s account.
Quick question, did the email include any urgency language like “update now” or “service will be suspended”?
That helps confirm if it was a phishing lure.
Regards,
Aron