Thursday, April 17, 2025
HomeCyber AttackNew Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

Published on

SIEM as a Service

Follow Us on Google News

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of IRS-themed scams.

Research from McAfee Labs has revealed a sharp increase in fraudulent activities targeting mobile devices, with scammers using deceptive text messages and fake IRS websites to steal personal and financial information.

Mobile Devices
Example of a fake IRS claim website 

Mobile Attacks Dominate Tax Scam Landscape

According to McAfee’s findings, mobile users are the primary targets of these scams, with 76% of tax-related phishing campaigns in 2024 delivered via text messages.

- Advertisement - Google News

These messages often include shortened URLs that mask their true destinations, making it harder for users to identify malicious links.

Mobile Devices
Scam texts that weave “irs.gov” into a malicious link 

Many of these fraudulent links mimic official IRS websites, such as “irs.gov.tax-helping[.]com,” tricking taxpayers into believing they are legitimate.

Scammers also employ urgent or fear-based tactics to manipulate victims.

Messages may claim that refunds are on hold or threaten legal action for unpaid taxes.

In reality, the IRS does not use such methods to communicate with taxpayers, making these red flags for potential fraud.

The Mechanics of IRS Scams

The scams typically unfold in two stages.

First, victims receive a message purporting to be from the IRS or a tax preparation service.

The message includes an urgent call to action and a link to a fake website designed to resemble official IRS pages.

Once victims click the link, they are prompted to provide sensitive information such as Social Security Numbers (SSNs), bank account details, or login credentials.

This stolen data can be used for various forms of fraud, including filing false tax returns to claim refunds, identity theft to open new credit accounts, or even reselling the information on dark web marketplaces.

The consequences for victims can be severe, often requiring months or years to resolve.

McAfee’s analysis highlights that these scams are not isolated incidents but part of highly coordinated campaigns.

For instance, one phishing campaign in 2024 accounted for 17.3% of all tax-related blocked URLs.

Scammers also impersonate well-known tax preparation and software companies, further complicating efforts to distinguish legitimate communications from fraudulent ones.

To safeguard against these attacks, taxpayers should remain vigilant and adopt proactive measures:

  • Verify Communications: The IRS primarily contacts individuals via physical mail and does not request personal information through text messages or emails.
  • Avoid Clicking Links: Instead of clicking on links in unsolicited messages, visit official websites directly by typing their URLs into your browser.
  • Use Security Tools: Employ cybersecurity solutions that detect phishing attempts and block malicious websites.
  • File Early: Submitting your tax return early reduces the risk of scammers filing a fraudulent return in your name.
  • Monitor Credit Activity: Regularly check your credit report for unusual activity and set up alerts for unauthorized transactions.

The surge in IRS-themed scams underscores the importance of heightened awareness during tax season.

By recognizing common tactics used by cybercriminals and taking preventative measures, taxpayers can protect themselves from falling victim to these sophisticated schemes.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...