Microsoft warns tax pros that they're phishing targets

Microsoft issued a warning about the rise of several new phishing campaigns taking advantage of the tax season to steal credentials and plant malware, some of which target accountants specifically. Microsoft noted that many of these campaigns use very specifically targeted communications in contrast to more generic lures. 

Processing Content

One of the campaigns that targets CPAs specifically starts with an email  asking for assistance in filing taxes, asking for a quote, and typically providing a backstory. If the actor receives a reply, they send a malicious link that leads to the installation of malware.

However, Microsoft also observed campaigns targeting CPAs that contain a similar backstory but include the malicious link in the first email. Many of these emails have the subject line "REQUEST FOR PROFESSIONAL TAX FILLING." The email provides a backstory that includes a description of a complex tax return situation involving tax audit, university tuition, loan interest, and real estate income. The sender also attempts to explain their inability to physically visit the office due to travel. Finally, the sender asks for a price quote. Microsoft observed variations of the backstory on different days, including one that claims the sender is switching CPAs due to fee increases.

Another campaign that is targeting accountants specifically involved, once again, scammers impersonating the IRS, this time through emails claiming that potentially irregular tax returns had been filed under the recipient's Electronic Filing Identification Number. Recipients were instructed to review these returns by downloading a purportedly legitimate "IRS Transcript Viewer" that leads to a malicious look‑alike domain mimicking SmartVault that even used Cloudflare for bot detection and blocking. Users who pass the bot check are then shown a fake verification animation and are led to a page where they can download the ostensible transcript viewer that is, in fact, a remote access and control tool. Subject lines for emails found to have this malicious link include:

  • IRS Request Transcript Review;
  • IRS Notice Firm Return Review;
  • CPA Compliance Review;
  • IRS Support Firm Filing Review; and,
  • Review Requested Compliance.
p1afk42fia1lbclrlc9qv84qpe8.jpg
E-mail symbol printed on a piece of paper hooked on a fishing hook. Phishing and data protection concept.
Ivelin Radkov/Ivelin Radkov - Fotolia

Another. more general. campaign starts with an email with the subject line "See Tax file," which contains an Excel attachment with [Accountant's name] CPA.xlsx, using the name of a real accountant (likely impersonated without their knowledge.) The attachment contains a clickable "REVIEW DOCUMENTS" button that links to a OneNote file hosted on OneDrive. The file, which uses the same CPA's name and logo, has a link leading to a malicious landing page that hosts the Energy365 phishing kit, which will attempt to harvest credentials such as email and password. 

Another starts with the subject line "2025 Employee Tax Docs" and contains an attachment named 2025_Employee_W-2  .docx with content that mentions various tax-related terms like Form W-2 and features a QR code pointing to a phishing page. Each document is customized to contain the recipient's name, and the URL hidden behind the QR code also contains the recipient's email address. This means that each recipient received a unique attachment. 

Another is connected to a set of domains that were registered to be used in tax-themed phishing campaigns that impersonate specific legitimate companies involved in accounting, tax preparation, finance, bookkeeping, and related companies. Emails with subject lines like "Your Account Now Includes Updated Tax Forms [RF] 1234" or "Your Form 1099-R is ready – [RF] 12123123" and a body saying things like "2025 Tax Forms is ready" and containing a clickable "View Tax Forms" button that goes to one of these dubiously registered domains, such as taxationstatments2025 [dot] com. These sites serve a malware executable named 1099-FR2025.exe, which will allow external actors to take control of the device remotely. 

Another campaign uses emails that impersonate the IRS, with the subject line "IR-2026-216." However, astute observers may realize that the email address does not come from irs.gov but from Eventbrite emails with names like: 

  • "IRS US"<noreply@campaign[.]eventbrite[.]com>
  • "IRS GOV"<noreply@campaign[.]eventbrite[.]com>
  • "Service"<noreply@campaign[.]eventbrite[.]com>
  • "IRS TAX"<noreply@campaign[.]eventbrite[.]com>
  • ".IRS.GOV"<noreply@campaign[.]eventbrite[.]com>

The email, with the body ""Cryptocurrency Tax Form 1099 is Ready" has a non-clickable URL the user is instructed to copy/paste into the browser. If they do this, the browser automatically downloads IRS-doc.msi, which is in actuality another remote access tool. 

Microsoft suggested a number of steps that tax preparers can take to protect themselves, their clients and their firms:


For reprint and licensing requests for this article, click here.
Technology Tax Tax preparers Phishing Cyber attacks
MORE FROM ACCOUNTING TODAY
Load More