chat
expand_more

Tax-Related Email Attacks Set to Spike in May

Recent email attacks detected by Abnormal Security, combined with an analysis of historical attack data, indicate that email attacks related to federal taxes are likely to spike in the coming weeks in advance of the May 17th filing deadline. Tax-related attacks in 2021 have followed a...
April 28, 2021

Recent email attacks detected by Abnormal Security, combined with an analysis of historical attack data, indicate that email attacks related to federal taxes are likely to spike in the coming weeks in advance of the May 17th filing deadline.

Tax-related attacks in 2021 have followed a similar pattern as 2020, where attack volume steadily increased throughout the early weeks of March. Last year, the IRS announced on March 21 that the filing deadline would be extended until July 15th. This was followed by a significant slowdown of tax-related email attacks—a 59% reduction from the week of July 15th to the week of July 22th. Volume remained low until July 5, 2020—10 days before the tax deadline—when tax-related email attacks surged. Attack volume increased 122% between the weeks of June 28th and July 5th.

In 2021, Abnormal’s data points to a similar trajectory, with attack volume increasing through the early weeks of March before a March 17th announcement that the filing deadline would be extended until May 17th. Tax-related attacks immediately cratered, falling by 60% between the weeks of March 14th and March 21th. As we approach the new May deadline, Abnormal Security expects to see a dramatic increase in tax-related email attacks, mirroring activity in 2020.

When comparing tax-related email attack data between 2020 and 2021, Abnormal Security researchers have found that, compared to this time last year, attack volume is up a whopping 400%, indicating that the upcoming spike will be significant.

While the volume of tax-related email attacks is much higher this year, the total attack volume is consistent with 2020 data. This is likely a result of opportunistic attackers leveraging the fear and confusion around the COVID-19 pandemic in the spring of 2020.

What to Look For: About the Tax Attacks

With the likelihood of increased attack activity leading up until the May 17th filing deadline, employees and security teams can learn from an analysis of year-to-date email attack data. Major themes included the status of users’ tax refunds, additional tax credits, and issues with their tax filings. Attacks impersonating or spoofing tax collection agencies have been prevalent, with:

  • 14.6% of all tax-related email subjects referencing the IRS,
  • 11.8% referencing Her Majesty’s Revenue and Customs (HMRC), the UK’s tax agency, and
  • 52% of spoofing or impersonation tax-related attacks referencing the IRS in the “from” address

The top attack groups have used subject lines that include the following:

  • “[EXT] Claim your free tax credit today”
  • “[EXT] Are you a future crypto tax preparer”
  • “HMRC Fourth SEISS Tax Refund Notification“
  • “Recalculation of Your Tax Refund Payment“
  • “Fw: Accepted Tax Payment: INTUIT SERVICE NOTICE”

This year’s tax-related attack data points to malicious actors becoming increasingly sophisticated in their targeting of high-level, VIP recipients. This is supported by the fact that nearly 100% of attacks have targeted individuals rather than group mailboxes. In addition, 12% of attacks targeted VIP employees—a 90% increase over the percentage of attacks targeting VIPs across all attack types (6.7%) during this period;

Additionally, employees with Head, VP, and finance titles were recipients of tax-related attacks disproportionate to their base percentages, seeing 33%, 100%, and 300% higher attack percentages than typical.

Job Level% of Recipients Receiving a Tax-Related Attack% of Recipients Receiving Any Attack
HEAD25%19%
VP9%4%
FINANCE4%1%
ASSISTANT3%3%
C-SUITE3%2%
GROUPS~0%.2%
OTHER56%66%

Abnormal Security researchers found that the majority of malicious tax-related attacks (63.9%) were attempts at credential phishing. Credential phishing can lead to compromised accounts, providing attackers with a foothold inside the organization and putting the organization at risk for data loss or further attacks launched from within. Credential phishing was followed by malware, reconnaissance, and scams as the top attack motives.

Protecting Yourself from Business Email Compromise Attacks

While tax agency impersonation and spoofing attacks have been the most common types of attacks, Abnormal researchers have found a number of examples of where attackers are impersonating internal resources and employees. One attack targeted employees of a Fortune 500 printing and digital services company and a high-ranking employee was impersonated, asking employees to click on a malicious link. Another impersonation attack perpetrated against one of the world’s largest beverage companies asked employees to click on a phony voicemail forwarded by an executive with the company.

Business email compromise attacks are a constant threat to enterprises and their employees. While malicious threat actors are gearing up to focus on the tax deadline to carry out upcoming attacks, their methods are constantly changing. After this spike, we expect cybercriminals to return to their most successful attacks, including brand impersonation and credential phishing attacks that tend to bypass traditional secure email gateways.

To protect your organization from novel attacks like these, ​request a demo​ to see how Abnormal Security can help you.

Tax-Related Email Attacks Set to Spike in May

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Convergence S2 Recap Blog
Season 2 of our web series has come to a close. Explore a few of the biggest takeaways and learn how to watch all three chapters on demand.
Read More
B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B Images for EDB Blog from Sanjay
Abnormal is excited to announce the establishment of a strategic partnership with the Singapore Economic Development Board (EDB).
Read More