Site icon LIFARS, a SecurityScorecard company

Hackers File Fake Tax Returns To Steal IRS Refunds

Beware of Business Email Compromise (BEC) During Tax Season

Beware of Business Email Compromise (BEC) During Tax Season

The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions of crooks try to steal Americans’ refunds. Earlier this month, the IRS said attackers exploiting the COVID-19 crisis could use stolen data to commit tax fraud. Last week, attackers tried obtaining large tax refunds by posing as clients of Weber and Company, the California-based accounting firm revealed. According to Weber and Company, the scammers apparently accessed clients’ personal data, including, perhaps, Social Security numbers and bank account information, to file fraudulent returns.

The US Internal Revenue Service had encountered a large-scale cyberattack in 2015, which caused the disclosure of sensitive information for more than 100,000 taxpayers. It is reported that the hackers used suspicious e-mail to log in to the IRS information system and breakthrough the department’s identity verification system with technical means. After hacking into the tax refund platform, the hacker downloaded the taxpayer ’s current and previous complete tax payment materials, and the taxpayer ’s social security number, birthday, tax declaration status, and address and other sensitive information were stolen. The hacker’s attack on the IRS has never stopped, resulting in the IRS’s tax refund service system being forced to shut down, and the tax refund declaration information can only be obtained by mail. These hacking techniques are advanced and have clear targets. Moreover, during this period, it was precisely the time for Americans to declare and pay taxes. A total of 23 million people used the IRS information system to perform operations such as downloading tax refund documents.

Cyber Threat Hunting is an essential exercise to proactively investigate potential compromises, detect advanced threats, and improve cyber defenses. Our experts orchestrate an exhaustive and iterative process with purpose-built tools to conduct manual and semi-automated series of searches for Indicators of Compromise (IOC) and Initial Vectors of Compromise (IVOC). Our Threat Hunting Framework includes:

 

 

Contact LIFARS Immediately For
Mitigating Cyber Risks in Your Organization

 

 

 

Exit mobile version