chat
expand_more

IRS Impersonated in Identity Theft Campaign

Although tax season has passed, IRS impersonation scams persist, putting many Americans at risk for identity theft and payment fraud. In this attack, scammers impersonate the IRS by sending out a fake tax form to collect valuable personal and financial information.
December 16, 2020

Although tax season has passed, IRS impersonation scams persist, putting many Americans at risk for identity theft and payment fraud. In this attack, scammers impersonate the IRS by sending out a fake tax form to collect valuable personal and financial information.

Summary of Attack Target

  • Platform: G Suite
  • Victims: VIP and Executives
  • Payload: Attachment / Fax Number
  • Technique: Spoofing / Impersonation

What was the attack?

This email attempts to steal information that could lead to identity theft, claiming that the recipient is a non-resident alien and telling them to fill out a W-8BEN tax exemption form to protect their status. The email instructs the recipient to fill out the provided form in order to maintain their non-resident tax exemption status.

Although this seems to only target non-resident aliens, the email widens its vulnerable audience by specifying that if the recipient is in fact a US citizen, they must indicate so on the form and still complete the form. The attack concludes by instructing the recipient to fax the form, along with a copy of their passport, to the provided fax number. Further investigation reveals that this is a known IRS scam number used to steal valuable information from unsuspecting taxpayers.


While the attached PDF looks legitimate, when compared to the W-8BEN tax form available for download on the IRS website, we see that the form in this email asks for much more personal information, like passport number and bank account details.


Even though the email appears to originate from “irs.gov”, which is a registered domain for the IRS, further analysis reveals that this email is actually spoofed—authentication fails for this message and the true sender domain is “huaweimobilewifi.com.” This is a Chinese registered domain that has no relation to the IRS.

Should the target bypass this and send the completed form and specified materials, they would release extremely sensitive information that could ultimately lead to identity theft. Additionally, the tax form asks for bank account information which, if filled out, would compromise the account of the victim and possibly lead to financial loss.

Why the IRS Scam is Effective

The email specifies that the recipient must fill out and return the form, along with a passport copy, within seven days in order to rectify their status. This motivates the recipient to act quickly so that, in their haste, they will spend less time assessing the legitimacy of the email. Additionally, the attack contains a PDF attachment that appears inconspicuous, as it does not contain malware or suspicious links that traditional email security platforms would flag.

The attacker uses professional language and a spoofed “irs.gov” domain to craft a credible impersonation of the IRS. In addition, the attached form looks very similar to the actual W-8BEN tax form. If one does not investigate closely enough, they might not detect the added malicious fields.

Abnormal is able to detect this attack due to the usual sender, the language that is used to steal personal information, and the fact that the sender domain does not match any domains found within the body.

IRS email scams have been around for many years and do not show any sign of relenting. Although the IRS warns on their website that they will never ask for personal tax information via email, these scams continue to defraud taxpayers across all industries.

To see how Abnormal can protect you and your employees from identity theft, request a demo today.

IRS Impersonated in Identity Theft Campaign

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B Images for EDB Blog from Sanjay
Abnormal is excited to announce the establishment of a strategic partnership with the Singapore Economic Development Board (EDB).
Read More
B Automotive Data Blog
Research reveals the automotive industry has become a popular target for business email compromise and vendor email compromise attacks. Learn why.
Read More