Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/Threats/Cybercriminals Use IRS, Tax Lures to Push Malware Abuse Filing
Threats

Cybercriminals Use IRS, Tax Lures to Push Malware Abuse Filing

Each tax season predictably triggers a surge of phishing attacks; however, 2026 has already demonstrated a significantly larger and more coordinated campaign than in prior years. Cybercriminals are...

Emy Elsamnoudy
Emy Elsamnoudy
March 31, 2026 4 Min Read
0 0

Each tax season predictably triggers a surge of phishing attacks; however, 2026 has already demonstrated a significantly larger and more coordinated campaign than in prior years.

Cybercriminals are actively impersonating the Internal Revenue Service (IRS), national tax authorities, and company HR departments to trick people into installing malware or handing over login credentials.

Over a hundred campaigns using tax-related lures have been recorded so far this year, delivering everything from malware to remote access tools and credential-stealing pages.

The range of tactics in these campaigns is wider than before. Attackers are spoofing emails about expired tax documents, IRS filing notices, W-2 form requests from fake HR teams, and even W-8BEN filings for non-U.S. taxpayers.

Malware and remote monitoring and management (RMM) payloads account for the bulk of threats delivered through tax-themed emails this year.

Breakdown of threat type delivered in tax-themed email campaigns (Source - Proofpoint)
Breakdown of threat type delivered in tax-themed email campaigns (Source – Proofpoint)

Campaigns have targeted users mainly in the United States, but also in Canada, Australia, Switzerland, and Japan, with email volumes ranging from a few targeted messages to tens of thousands.

Proofpoint researchers identified over a dozen IRS-impersonation RMM campaigns since January 2026 and flagged two specific threat actor groups — TA4922 and TA2730 — each running organized operations with clear financial objectives.

Researchers noted that 2026 shows more RMM payloads than past tax seasons, with activity from newly identified actors and a broader variety of social engineering lures than previously observed.

Abusing legitimate RMM software has become a go-to move for these actors. Tools like N-able, Datto, RemotePC, Zoho Assist, and ScreenConnect are trusted by enterprise security systems because they are legitimate, digitally signed applications — making them hard to detect as threats.

Phishing lure impersonating the IRS delivering N-able RMM (Source - Proofpoint)
Phishing lure impersonating the IRS delivering N-able RMM (Source – Proofpoint)

On February 5, a campaign impersonating the IRS sent emails with a fake “Transcript Viewer” button, which linked to a Bitbucket-hosted executable that silently installed N-able RMM on the victim’s machine.

The attacker also included a real IRS phone number in the email to make the message look official.

TA2730 email impersonating Swissquote (left) and malicious phishing landing page impersonating the company (right) (Source - Proofpoint)
TA2730 email impersonating Swissquote (left) and malicious phishing landing page impersonating the company (right) (Source – Proofpoint)

Separately, TA2730 — a credential phishing group tracked by Proofpoint since June 2025 — ran campaigns impersonating investment firms and asking targets to update W-8BEN tax forms.

TA2730 email impersonating Questrade (left) and malicious phishing landing page impersonating the company (right) (Source - Proofpoint)
TA2730 email impersonating Questrade (left) and malicious phishing landing page impersonating the company (right) (Source – Proofpoint)

In February 2026, the actor impersonated Swissquote in Switzerland and Questrade in Canada, directing victims to fake login pages built to steal account credentials for financial gain.

TA4922’s Multi-Step Social Engineering Approach

Among the threat actors identified this year, TA4922 stands out for its deliberate, multi-stage attack chain. Tracked by Proofpoint since spring 2025, this financially motivated group is believed to be based in East Asia and is likely Chinese-speaking.

Its primary goal is gaining remote access to victim systems for fraud, data theft, or selling that access to other criminals.

TA4922 primarily delivers malware from the Winos4.0 ecosystem — also known as ValleyRAT — using a combination of loaders and information stealers.

What makes this actor particularly dangerous is its two-phase approach. The group begins by sending an impersonation email posing as a tax authority claiming the recipient has unresolved tax obligations and requesting a mobile phone number to continue discussions.

Once that private channel is established, the actor escalates by pretending to be company finance leadership before delivering malicious files or links outside of email.

Inland Revenue Department impersonation (Source - Proofpoint)
Inland Revenue Department impersonation (Source – Proofpoint)

In early March 2026, a related campaign spoofed the Inland Revenue Department, leading victims to download an information stealer that remains under active investigation by Proofpoint researchers.

Organizations and employees can take clear steps to protect themselves. Security teams should enforce allow-listing policies to ensure that only approved RMM tools can run on corporate networks, reducing the risk of unauthorized remote access software going undetected.

Employees need regular training that covers tax-season phishing techniques and teaches them to question emails requesting personal contact details or prompting action on tax filings through external links.

Any unsolicited message from a supposed tax authority or HR contact should always be verified through official channels before any action is taken.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

DeepLoad Malware Breaches Enterprise Networks via ClickFix & AI

Next Post

CISA Warns: Citrix NetScaler Vulnerability Actively Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us