March 31, 2022
When it Comes to Tax Season, There is No Safe Haven From Phishing


In this world, nothing is certain except death and taxes. The latter of which malicious actors capitalize on seasonally with phishing attacks. From consumers to corporate finance and human resources (HR) departments, these social engineering attacks have become so pervasive that the IRS issued an annual advisory as a warning to businesses and consumers.
How bad actors get away with tax fraud
Tax season presents a unique opportunity for cyberattackers to commit identity theft and file fraudulent tax refunds. One of the most common tax-related phishing attacks is for malicious actors to pose as members of the accounting department or the tax authorities, such as the U.S. Internal Revenue Service (IRS), to socially engineer employees into sharing sensitive tax-related information including social security numbers or personal bank account information. To do this, they’ll leverage a number of tactics including:
- Sending attachments that install malware onto the target’s smartphone, tablet or personal computer.
- Sending fake authentication messages through SMS that convince the employee to enter their login credentials on a malicious site.
- Contacting employees over the phone and directing them to download a malicious app or visit a phishing page to access allegedly compromised tax documents.
While finance and HR professionals are aware of these types of attacks and remain diligent in protecting their employees’ personal information, the work-from-anywhere environment has made this more challenging. With many of these professionals working outside the office, it is no longer as easy to turn to colleagues to verify a suspicious message, making remote workers more vulnerable to respond to an urgent request.
Add to this the fact that mobile endpoints are much more trusted than desktop computers, as they’re increasingly relied upon by employees for both work and personal reasons. This means any messages received on them are less scrutinized. And because these devices have smaller screens and simplified user interfaces, it’s quite difficult to spot telltale signs of a phishing attack.

Book a Demo
Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.