chat
expand_more

Tax-Related Email Attacks Set to Spike in May

Recent email attacks detected by Abnormal Security, combined with an analysis of historical attack data, indicate that email attacks related to federal taxes are likely to spike in the coming weeks in advance of the May 17th filing deadline. Tax-related attacks in 2021 have followed a...
April 28, 2021

Recent email attacks detected by Abnormal Security, combined with an analysis of historical attack data, indicate that email attacks related to federal taxes are likely to spike in the coming weeks in advance of the May 17th filing deadline.

Tax-related attacks in 2021 have followed a similar pattern as 2020, where attack volume steadily increased throughout the early weeks of March. Last year, the IRS announced on March 21 that the filing deadline would be extended until July 15th. This was followed by a significant slowdown of tax-related email attacks—a 59% reduction from the week of July 15th to the week of July 22th. Volume remained low until July 5, 2020—10 days before the tax deadline—when tax-related email attacks surged. Attack volume increased 122% between the weeks of June 28th and July 5th.

In 2021, Abnormal’s data points to a similar trajectory, with attack volume increasing through the early weeks of March before a March 17th announcement that the filing deadline would be extended until May 17th. Tax-related attacks immediately cratered, falling by 60% between the weeks of March 14th and March 21th. As we approach the new May deadline, Abnormal Security expects to see a dramatic increase in tax-related email attacks, mirroring activity in 2020.

When comparing tax-related email attack data between 2020 and 2021, Abnormal Security researchers have found that, compared to this time last year, attack volume is up a whopping 400%, indicating that the upcoming spike will be significant.

While the volume of tax-related email attacks is much higher this year, the total attack volume is consistent with 2020 data. This is likely a result of opportunistic attackers leveraging the fear and confusion around the COVID-19 pandemic in the spring of 2020.

What to Look For: About the Tax Attacks

With the likelihood of increased attack activity leading up until the May 17th filing deadline, employees and security teams can learn from an analysis of year-to-date email attack data. Major themes included the status of users’ tax refunds, additional tax credits, and issues with their tax filings. Attacks impersonating or spoofing tax collection agencies have been prevalent, with:

  • 14.6% of all tax-related email subjects referencing the IRS,
  • 11.8% referencing Her Majesty’s Revenue and Customs (HMRC), the UK’s tax agency, and
  • 52% of spoofing or impersonation tax-related attacks referencing the IRS in the “from” address

The top attack groups have used subject lines that include the following:

  • “[EXT] Claim your free tax credit today”
  • “[EXT] Are you a future crypto tax preparer”
  • “HMRC Fourth SEISS Tax Refund Notification“
  • “Recalculation of Your Tax Refund Payment“
  • “Fw: Accepted Tax Payment: INTUIT SERVICE NOTICE”

This year’s tax-related attack data points to malicious actors becoming increasingly sophisticated in their targeting of high-level, VIP recipients. This is supported by the fact that nearly 100% of attacks have targeted individuals rather than group mailboxes. In addition, 12% of attacks targeted VIP employees—a 90% increase over the percentage of attacks targeting VIPs across all attack types (6.7%) during this period;

Additionally, employees with Head, VP, and finance titles were recipients of tax-related attacks disproportionate to their base percentages, seeing 33%, 100%, and 300% higher attack percentages than typical.

Job Level% of Recipients Receiving a Tax-Related Attack% of Recipients Receiving Any Attack
HEAD25%19%
VP9%4%
FINANCE4%1%
ASSISTANT3%3%
C-SUITE3%2%
GROUPS~0%.2%
OTHER56%66%

Abnormal Security researchers found that the majority of malicious tax-related attacks (63.9%) were attempts at credential phishing. Credential phishing can lead to compromised accounts, providing attackers with a foothold inside the organization and putting the organization at risk for data loss or further attacks launched from within. Credential phishing was followed by malware, reconnaissance, and scams as the top attack motives.

Protecting Yourself from Business Email Compromise Attacks

While tax agency impersonation and spoofing attacks have been the most common types of attacks, Abnormal researchers have found a number of examples of where attackers are impersonating internal resources and employees. One attack targeted employees of a Fortune 500 printing and digital services company and a high-ranking employee was impersonated, asking employees to click on a malicious link. Another impersonation attack perpetrated against one of the world’s largest beverage companies asked employees to click on a phony voicemail forwarded by an executive with the company.

Business email compromise attacks are a constant threat to enterprises and their employees. While malicious threat actors are gearing up to focus on the tax deadline to carry out upcoming attacks, their methods are constantly changing. After this spike, we expect cybercriminals to return to their most successful attacks, including brand impersonation and credential phishing attacks that tend to bypass traditional secure email gateways.

To protect your organization from novel attacks like these, ​request a demo​ to see how Abnormal Security can help you.

Tax-Related Email Attacks Set to Spike in May

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Proofpoint Customer Story Blog 8
A Fortune 500 transportation and logistics leader blocked more than 6,700 attacks missed by Proofpoint and reclaimed 350 SOC hours per month by adding Abnormal to its security stack.
Read More
B Gartner MQ 2024 Announcement Blog
Abnormal Security was named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms and positioned furthest for Completeness of Vision.
Read More
B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B Offensive AI 12 16 24
Learn how AI is used in cybersecurity, what defensive AI vs. offensive AI means, and how to use defensive AI to combat offensive AI.
Read More
B Proofpoint Customer Story Blog 7
See how Abnormal's AI helped a Fortune 500 insurance provider detect 27,847 threats missed by Proofpoint and save 6,600+ hours in employee productivity.
Read More
B Cyberattack Forecast Emerging Threats Blog
Uncover the latest email threats and strategies to strengthen your cybersecurity and prepare for 2025.
Read More