Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityBanking/Finance/Insurance

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

By Brian Baskin
Calculator with pen and notebook
Recha Oktaviani via Unsplash
March 31, 2026

Every year, tax season opens the door for a wave of cyber threats for both individuals and their employees that many know exist but few think to look out for: phishing schemes. Tax season-related phishing attacks have gotten more sophisticated as threat actors increasingly leverage generative AI in their attacks, allowing them to impersonate employees, executives, HR and finance departments, and even the IRS itself. With several potential origins for an attack, it’s critical for everyone both in their personal and professional lives to stay vigilant and take precautions.

IRS Impersonation on the Rise 

IRS impersonation remains one of the most reliable social engineering plays because it targets a true, and urgent, pain point. In fact, the IRS was one of the most highly impersonated brands last year. Taxes are confusing, time-sensitive, and high-stakes which attackers take advantage of by copying government language, citing reference numbers, and presenting next steps that appear legitimate and secure. The objective is to push the victim to submit personal data, credentials, or payment details quickly and without deeper thought.

Much of the attack relies on the general public not understanding how agencies like the IRS typically communicate. The IRS contacts taxpayers first by U.S. mail; it does not initiate contact through email, text message, or social media to request personal or financial information. If an unexpected message claims to be the IRS and demands immediate action, users and organizations should treat it as suspicious until proven otherwise. 

Beyond creating a sense of urgency, attackers have evolved to better bypass people’s instinctive defenses. Many people have been trained to inspect links to look for misspellings, unicode characters, or suspicious domain names. Because of this, campaigns have increasingly avoided direct URLs and shifted to QR codes, especially embedded in PDF attachments. Their goal is convenience: getting victims to quickly scan with their phone cameras and upload missing information or verify their identity. In reality, a QR code is typically just a URL that cannot be evaluated until scanned, often on a user’s personal phone, outside corporate protections. While the attack may come in via email, the shift to scanning a QR code means that any further actions are not tracked, or even noticed, by security teams. While QR codes make processes simpler, they are not how typical government business is performed, and attackers rely on the general public not realizing it.

Call-back phone numbers are another increasingly common defense bypass. Some scams steer victims to urgently call a specific phone number to resolve a relevant issue, relying on urgency and a persuasive script. Adversaries know that victims have been trained to not simply click links, and to verify via phone, so it's natural to then encourage using a call center (imitating the IRS) to collect information. Phone numbers contained within any email, attachment, or document received should not be trusted. Instead, search for the official call numbers of the agency and call directly. Phone numbers are also typically indexed via search engines, so searching the phone number provided to you by the attacker will often reveal that it has no ties to the agency. 

Identifying Workplace-Oriented Tax Season Scams

These tactics do not stop with individual taxpayers. They show up inside organizations as HR and Finance impersonation, and the impact is often tax-related. W-2 information, Social Security numbers, addresses, and payroll details are high-value identity artifacts. Attackers target HR, payroll, and finance teams with requests that look routine: resend a W-2, confirm employee tax details, change direct deposits, update vendor banking, or approve a payment. Oftentimes, these messages leverage a technique known as “threadjacking,” wherein attackers try to attempt to trick users by using existing context and fake threads to divert an ongoing conversation to a malicious payload. This is often completed by a compromised internal account, or one from a known vendor, where the adversaries search for existing email threads and try to persuade the victim. The message may appear to come from an employee, a vendor, or an executive, but an email thread is not identity proof.

Many of these malicious messages do not actually carry malware and contain no obvious links, so detection has to focus on intent. Lookalike domains, display name tricks, and compromised accounts can still produce convincing messages. Practical measures include labeling external senders, flagging messages that introduce new payment instructions or request tax forms, and treating last-minute shifts to other communication mediums, such as “text me” or “call this number,” as a risk signal. 

Steps to Mitigate the Risk

What should users do if they receive any information they’re unsure about related to their taxes? Go straight to the source. Users should not click, scan, or reply to any unexpected message appearing to be sent from the IRS. Instead, they should open a browser and navigate directly to the official destination. If searching via a search engine, ensure that an advertisement is not clicked. Malicious ads can be found on major search engines that mimic the look of the legitimate site. If a notice is real, it can be addressed from an official entry point without using the attacker’s provided route. The same goes for communication allegedly from an employee or an employer: it’s critical to verify directly with the specific point of contact before providing any information. This breaks the attacker’s advantage: controlling where the recipient lands and who they talk to.

For people and organizations alike, quick and easy reporting is the best way to counter a threat. People will receive convincing malicious messages, especially during tax season, and modern defenses should not be centered on assuming the email recipient will identify the threat. When reporting is blame-free and simple, scams get surfaced earlier and follow-on attempts become less effective.

IRS impersonation and HR or Finance targeting succeed when speed beats verification. It’s critical for users and organizations to verify the source, treat QR codes as hidden links, and never trust a phone number that arrives inside an unexpected message. More than anything, vigilance is key, but by disrupting attackers’ reliance on influencing urgent action, calmer heads prevail and everyone will be safer this tax season as a result.
KEYWORDS: artificial intelligence (AI) phishing social engineering taxes

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brian baskin headshot

Brian Baskin is Threat Research Lead at Sublime. Image courtesy of Baskin

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Swirls of orange, yellow, and red on black screen

    How businesses can protect themselves from data breaches

    See More
  • smb-cyber

    How small businesses and restaurants can protect themselves from cyber threats

    See More
  • tax-papers-on-desk.jpg

    How to cut the line on increasingly phishy hackers this tax season

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing