Monday, April 28, 2025
HomeCyber AttackHackers Use URL Shorteners and QR Codes in Tax-Themed Phishing Attacks

Hackers Use URL Shorteners and QR Codes in Tax-Themed Phishing Attacks

Published on

SIEM as a Service

Follow Us on Google News

As the United States approaches Tax Day on April 15, cybersecurity experts have uncovered a series of sophisticated phishing campaigns leveraging tax-related themes to exploit unsuspecting users.

Microsoft has identified these campaigns as employing advanced redirection techniques such as URL shorteners and QR codes embedded in malicious attachments to evade detection.

By abusing legitimate services like file-hosting platforms and business profile pages, attackers aim to deliver malware and steal sensitive credentials.

- Advertisement - Google News

The phishing attacks are linked to the RaccoonO365 phishing-as-a-service (PhaaS) platform, as well as malware families such as Remcos, Latrodectus, BruteRatel C4 (BRc4), AHKBot, and GuLoader.

These tools enable attackers to gain unauthorized access, deploy payloads, and conduct further malicious activities.

 Phishing Attacks
Sample phishing email that claims to be from the IRS

Malware Delivered Through Tax-Themed Emails

Microsoft observed several campaigns exploiting tax-related fears and obligations to deceive users.

One campaign, attributed to the threat actor Storm-0249, targeted thousands of users with emails claiming issues with their IRS filings.

These emails contained PDF attachments with embedded DoubleClick URLs that redirected users through Rebrandly shortened links to fake DocuSign pages.

If users interacted with these pages, they were either served malicious JavaScript files leading to malware installation or benign decoy files based on filtering rules.

Another campaign used QR codes embedded in PDF attachments sent to over 2,300 organizations between February 12 and 28, 2025.

The QR codes directed recipients to phishing pages mimicking Microsoft 365 login portals designed to steal credentials.

These emails were disguised under display names such as “EMPLOYEE TAX REFUND REPORT” and “Tax Strategy Update Campaign Goals,” adding credibility to the attack.

Advanced Malware Techniques Exploited

The malware used in these campaigns demonstrates advanced capabilities:

  • Latrodectus: A loader with dynamic command-and-control (C2) configurations and anti-analysis features. Its latest version adds persistence mechanisms like scheduled tasks and allows attackers to execute Windows commands remotely.
  • BruteRatel C4 (BRc4): Originally designed for red-teaming exercises, this framework is exploited by attackers for post-exploitation activities, including bypassing security defenses.
  • AHKBot: Delivered via IRS-themed phishing emails containing malicious Excel files. Once macros are enabled, this malware downloads scripts capable of capturing screenshots and executing commands.
  • GuLoader: A highly evasive downloader that employs encrypted shellcode and anti-analysis techniques to deliver payloads like Remcos a remote access trojan enabling full control over compromised systems.

In a targeted campaign hackers focused on CPAs and accountants in the U.S., employing rapport-building tactics before delivering malicious PDFs.

These PDFs contained URLs leading to ZIP files hosted on Dropbox. Once opened, the files executed PowerShell scripts that installed GuLoader and Remcos malware.

 Phishing Attacks
Macro code to install the malicious MSI file from hxxps://acusense[.]ae/umbrella/

To combat these threats, Microsoft recommends organizations implement robust security measures:

  1. User Education: Train employees to identify phishing attempts and avoid interacting with suspicious links or attachments.
  2. Multi-Factor Authentication (MFA): Enforce MFA across all accounts to minimize unauthorized access risks.
  3. Advanced Security Solutions: Use tools like Microsoft Defender for Office 365 for real-time email scanning and URL verification.
  4. Endpoint Protection: Enable cloud-delivered antivirus protection and endpoint detection response (EDR) in block mode for comprehensive defense against evolving threats.

These campaigns highlight the importance of vigilance during tax season, as cybercriminals continue to refine their methods using legitimate services and advanced malware frameworks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...