Tax-Related Email Attacks Set to Spike in May
Recent email attacks detected by Abnormal Security, combined with an analysis of historical attack data, indicate that email attacks related to federal taxes are likely to spike in the coming weeks in advance of the May 17th filing deadline.
Tax-related attacks in 2021 have followed a similar pattern as 2020, where attack volume steadily increased throughout the early weeks of March. Last year, the IRS announced on March 21 that the filing deadline would be extended until July 15th. This was followed by a significant slowdown of tax-related email attacks—a 59% reduction from the week of July 15th to the week of July 22th. Volume remained low until July 5, 2020—10 days before the tax deadline—when tax-related email attacks surged. Attack volume increased 122% between the weeks of June 28th and July 5th.
In 2021, Abnormal’s data points to a similar trajectory, with attack volume increasing through the early weeks of March before a March 17th announcement that the filing deadline would be extended until May 17th. Tax-related attacks immediately cratered, falling by 60% between the weeks of March 14th and March 21th. As we approach the new May deadline, Abnormal Security expects to see a dramatic increase in tax-related email attacks, mirroring activity in 2020.
When comparing tax-related email attack data between 2020 and 2021, Abnormal Security researchers have found that, compared to this time last year, attack volume is up a whopping 400%, indicating that the upcoming spike will be significant.
While the volume of tax-related email attacks is much higher this year, the total attack volume is consistent with 2020 data. This is likely a result of opportunistic attackers leveraging the fear and confusion around the COVID-19 pandemic in the spring of 2020.
What to Look For: About the Tax Attacks
With the likelihood of increased attack activity leading up until the May 17th filing deadline, employees and security teams can learn from an analysis of year-to-date email attack data. Major themes included the status of users’ tax refunds, additional tax credits, and issues with their tax filings. Attacks impersonating or spoofing tax collection agencies have been prevalent, with:
- 14.6% of all tax-related email subjects referencing the IRS,
- 11.8% referencing Her Majesty’s Revenue and Customs (HMRC), the UK’s tax agency, and
- 52% of spoofing or impersonation tax-related attacks referencing the IRS in the “from” address
The top attack groups have used subject lines that include the following:
- “[EXT] Claim your free tax credit today”
- “[EXT] Are you a future crypto tax preparer”
- “HMRC Fourth SEISS Tax Refund Notification“
- “Recalculation of Your Tax Refund Payment“
- “Fw: Accepted Tax Payment: INTUIT SERVICE NOTICE”
This year’s tax-related attack data points to malicious actors becoming increasingly sophisticated in their targeting of high-level, VIP recipients. This is supported by the fact that nearly 100% of attacks have targeted individuals rather than group mailboxes. In addition, 12% of attacks targeted VIP employees—a 90% increase over the percentage of attacks targeting VIPs across all attack types (6.7%) during this period;
Additionally, employees with Head, VP, and finance titles were recipients of tax-related attacks disproportionate to their base percentages, seeing 33%, 100%, and 300% higher attack percentages than typical.
Job Level | % of Recipients Receiving a Tax-Related Attack | % of Recipients Receiving Any Attack |
HEAD | 25% | 19% |
VP | 9% | 4% |
FINANCE | 4% | 1% |
ASSISTANT | 3% | 3% |
C-SUITE | 3% | 2% |
GROUPS | ~0% | .2% |
OTHER | 56% | 66% |
Abnormal Security researchers found that the majority of malicious tax-related attacks (63.9%) were attempts at credential phishing. Credential phishing can lead to compromised accounts, providing attackers with a foothold inside the organization and putting the organization at risk for data loss or further attacks launched from within. Credential phishing was followed by malware, reconnaissance, and scams as the top attack motives.
Protecting Yourself from Business Email Compromise Attacks
While tax agency impersonation and spoofing attacks have been the most common types of attacks, Abnormal researchers have found a number of examples of where attackers are impersonating internal resources and employees. One attack targeted employees of a Fortune 500 printing and digital services company and a high-ranking employee was impersonated, asking employees to click on a malicious link. Another impersonation attack perpetrated against one of the world’s largest beverage companies asked employees to click on a phony voicemail forwarded by an executive with the company.
Business email compromise attacks are a constant threat to enterprises and their employees. While malicious threat actors are gearing up to focus on the tax deadline to carry out upcoming attacks, their methods are constantly changing. After this spike, we expect cybercriminals to return to their most successful attacks, including brand impersonation and credential phishing attacks that tend to bypass traditional secure email gateways.
To protect your organization from novel attacks like these, request a demo to see how Abnormal Security can help you.