Tax-Related Email Attacks Set to Spike in May

April 28, 2021

Recent email attacks detected by Abnormal Security, combined with an analysis of historical attack data, indicate that email attacks related to federal taxes are likely to spike in the coming weeks in advance of the May 17th filing deadline.

Tax-related attacks in 2021 have followed a similar pattern as 2020, where attack volume steadily increased throughout the early weeks of March. Last year, the IRS announced on March 21 that the filing deadline would be extended until July 15th. This was followed by a significant slowdown of tax-related email attacks—a 59% reduction from the week of July 15th to the week of July 22th. Volume remained low until July 5, 2020—10 days before the tax deadline—when tax-related email attacks surged. Attack volume increased 122% between the weeks of June 28th and July 5th.

In 2021, Abnormal’s data points to a similar trajectory, with attack volume increasing through the early weeks of March before a March 17th announcement that the filing deadline would be extended until May 17th. Tax-related attacks immediately cratered, falling by 60% between the weeks of March 14th and March 21th. As we approach the new May deadline, Abnormal Security expects to see a dramatic increase in tax-related email attacks, mirroring activity in 2020.

When comparing tax-related email attack data between 2020 and 2021, Abnormal Security researchers have found that, compared to this time last year, attack volume is up a whopping 400%, indicating that the upcoming spike will be significant.

While the volume of tax-related email attacks is much higher this year, the total attack volume is consistent with 2020 data. This is likely a result of opportunistic attackers leveraging the fear and confusion around the COVID-19 pandemic in the spring of 2020.

What to Look For: About the Tax Attacks

With the likelihood of increased attack activity leading up until the May 17th filing deadline, employees and security teams can learn from an analysis of year-to-date email attack data. Major themes included the status of users’ tax refunds, additional tax credits, and issues with their tax filings. Attacks impersonating or spoofing tax collection agencies have been prevalent, with:

  • 14.6% of all tax-related email subjects referencing the IRS,
  • 11.8% referencing Her Majesty’s Revenue and Customs (HMRC), the UK’s tax agency, and
  • 52% of spoofing or impersonation tax-related attacks referencing the IRS in the “from” address

The top attack groups have used subject lines that include the following:

  • “[EXT] Claim your free tax credit today”
  • “[EXT] Are you a future crypto tax preparer”
  • “HMRC Fourth SEISS Tax Refund Notification“
  • “Recalculation of Your Tax Refund Payment“
  • “Fw: Accepted Tax Payment: INTUIT SERVICE NOTICE”

This year’s tax-related attack data points to malicious actors becoming increasingly sophisticated in their targeting of high-level, VIP recipients. This is supported by the fact that nearly 100% of attacks have targeted individuals rather than group mailboxes. In addition, 12% of attacks targeted VIP employees—a 90% increase over the percentage of attacks targeting VIPs across all attack types (6.7%) during this period;

Additionally, employees with Head, VP, and finance titles were recipients of tax-related attacks disproportionate to their base percentages, seeing 33%, 100%, and 300% higher attack percentages than typical.

Job Level% of Recipients Receiving a Tax-Related Attack% of Recipients Receiving Any Attack
HEAD25%19%
VP9%4%
FINANCE4%1%
ASSISTANT3%3%
C-SUITE3%2%
GROUPS~0%.2%
OTHER56%66%

Abnormal Security researchers found that the majority of malicious tax-related attacks (63.9%) were attempts at credential phishing. Credential phishing can lead to compromised accounts, providing attackers with a foothold inside the organization and putting the organization at risk for data loss or further attacks launched from within. Credential phishing was followed by malware, reconnaissance, and scams as the top attack motives.

Protecting Yourself from Business Email Compromise Attacks

While tax agency impersonation and spoofing attacks have been the most common types of attacks, Abnormal researchers have found a number of examples of where attackers are impersonating internal resources and employees. One attack targeted employees of a Fortune 500 printing and digital services company and a high-ranking employee was impersonated, asking employees to click on a malicious link. Another impersonation attack perpetrated against one of the world’s largest beverage companies asked employees to click on a phony voicemail forwarded by an executive with the company.

Business email compromise attacks are a constant threat to enterprises and their employees. While malicious threat actors are gearing up to focus on the tax deadline to carry out upcoming attacks, their methods are constantly changing. After this spike, we expect cybercriminals to return to their most successful attacks, including brand impersonation and credential phishing attacks that tend to bypass traditional secure email gateways.

To protect your organization from novel attacks like these, ​request a demo​ to see how Abnormal Security can help you.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More