IRS-Themed Cyberattacks Intensify, Targeting Taxpayers’ Mobile Devices

As Tax Day approaches, cybercriminals are ramping up their efforts to exploit taxpayers through a surge of IRS-themed scams, with mobile devices emerging as the primary target.

Research from McAfee Labs highlights a sharp increase in fraudulent activities, particularly text-based phishing attacks, as taxpayers rush to meet filing deadlines.

These scams leverage urgency and fear to trick individuals into revealing sensitive personal and financial information.

Mobile Devices: The Epicenter of Tax Scams

According to the Report, mobile platforms accounted for 76% of all tax scam activity in 2024.

Scammers predominantly use text messages embedded with shortened URLs to disguise malicious links.

Mobile Devices
Scam texts that weave “irs.gov” into a malicious link 

These links often mimic official IRS websites or tax preparation services, luring victims into providing Social Security Numbers (SSNs), bank account details, or login credentials.

For example, scammers craft deceptive URLs such as “irs.gov.tax-helping[.]com,” which appear legitimate but redirect users to fraudulent websites.

These sites replicate the design of official IRS pages to collect sensitive information under the guise of processing refunds or resolving tax issues.

The tactics employed by cybercriminals during tax season are highly coordinated and damaging. Key strategies include:

  • Phishing via Text: Messages claim urgent action is required, such as resolving refund holds or avoiding penalties.
  • Identity Theft: Stolen SSNs are used to open credit lines, file false returns, or commit employment fraud.
  • Fraudulent Refund Claims: Scammers file fake tax returns in victims’ names to intercept refunds.
  • Dark Web Sales: Personal data harvested from these scams is often sold on underground marketplaces for further exploitation.

These attacks not only lead to immediate financial losses but also long-term consequences for victims, including damaged credit scores and reputational harm.

The Anatomy of an IRS Scam

IRS-themed scams typically unfold in two stages:

  1. Initial Contact: Victims receive a text or email impersonating the IRS or a tax preparation service. The message may threaten legal action or offer quick refunds to create urgency.
  2. Data Harvesting: Clicking the fraudulent link redirects users to a counterfeit website where they are prompted to enter personal and financial details. Once submitted, this data is exploited for identity theft or financial fraud.

The sophistication of these scams makes them particularly dangerous.

Mobile Devices
Example of a fake IRS claim website 

Even tech-savvy individuals can fall prey if they fail to scrutinize URLs or recognize red flags like aggressive language and threats.

Taxpayers can protect themselves by adopting proactive measures:

  • Verify Communication Sources: The IRS primarily contacts individuals via physical mail, not texts or emails. Any digital communication claiming to be from the IRS should be treated with suspicion.
  • Avoid Clicking Links: Instead of using links in unsolicited messages, visit official websites directly by typing the URL into your browser.
  • Secure Personal Data: Use strong passwords, enable two-factor authentication, and monitor credit reports for suspicious activity.
  • Leverage Security Tools: Advanced cybersecurity solutions can detect and block phishing attempts before they cause harm.

Filing taxes early is another effective way to minimize risk; it prevents scammers from submitting fraudulent returns in your name before you do.

As tax season progresses, the surge in IRS-themed cyberattacks underscores the importance of vigilance among taxpayers.

By staying informed and implementing robust security practices, individuals can reduce their exposure to these increasingly sophisticated threats.

Find this Story Interesting! Follow us on LinkedIn, and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here