IRS Impersonated in Identity Theft Campaign
Although tax season has passed, IRS impersonation scams persist, putting many Americans at risk for identity theft and payment fraud. In this attack, scammers impersonate the IRS by sending out a fake tax form to collect valuable personal and financial information.
Summary of Attack Target
- Platform: G Suite
- Victims: VIP and Executives
- Payload: Attachment / Fax Number
- Technique: Spoofing / Impersonation
What was the attack?
This email attempts to steal information that could lead to identity theft, claiming that the recipient is a non-resident alien and telling them to fill out a W-8BEN tax exemption form to protect their status. The email instructs the recipient to fill out the provided form in order to maintain their non-resident tax exemption status.
Although this seems to only target non-resident aliens, the email widens its vulnerable audience by specifying that if the recipient is in fact a US citizen, they must indicate so on the form and still complete the form. The attack concludes by instructing the recipient to fax the form, along with a copy of their passport, to the provided fax number. Further investigation reveals that this is a known IRS scam number used to steal valuable information from unsuspecting taxpayers.
While the attached PDF looks legitimate, when compared to the W-8BEN tax form available for download on the IRS website, we see that the form in this email asks for much more personal information, like passport number and bank account details.
Even though the email appears to originate from “irs.gov”, which is a registered domain for the IRS, further analysis reveals that this email is actually spoofed—authentication fails for this message and the true sender domain is “huaweimobilewifi.com.” This is a Chinese registered domain that has no relation to the IRS.
Should the target bypass this and send the completed form and specified materials, they would release extremely sensitive information that could ultimately lead to identity theft. Additionally, the tax form asks for bank account information which, if filled out, would compromise the account of the victim and possibly lead to financial loss.
Why the IRS Scam is Effective
The email specifies that the recipient must fill out and return the form, along with a passport copy, within seven days in order to rectify their status. This motivates the recipient to act quickly so that, in their haste, they will spend less time assessing the legitimacy of the email. Additionally, the attack contains a PDF attachment that appears inconspicuous, as it does not contain malware or suspicious links that traditional email security platforms would flag.
The attacker uses professional language and a spoofed “irs.gov” domain to craft a credible impersonation of the IRS. In addition, the attached form looks very similar to the actual W-8BEN tax form. If one does not investigate closely enough, they might not detect the added malicious fields.
Abnormal is able to detect this attack due to the usual sender, the language that is used to steal personal information, and the fact that the sender domain does not match any domains found within the body.
IRS email scams have been around for many years and do not show any sign of relenting. Although the IRS warns on their website that they will never ask for personal tax information via email, these scams continue to defraud taxpayers across all industries.
To see how Abnormal can protect you and your employees from identity theft, request a demo today.