Monday, March 17, 2025
Homecyber securityFake Tax Claims Scam Stealing Over $10,000 from Victims

Fake Tax Claims Scam Stealing Over $10,000 from Victims

Published on

SIEM as a Service

Follow Us on Google News

Tax season has become a breeding ground for sophisticated AI-powered scams, with nearly half of Americans reporting fraudulent IRS-related communications, according to McAfee’s 2025 survey.

Cybercriminals are leveraging deepfake audio, phishing emails, and spoofed websites to steal identities and funds, costing victims up to $10,000 in losses—and in some cases, far more.

Escalating Threats Across Generations

Gen Z adults (18–24) face the highest rate of attempted fraud, with 40% encountering scams.

However, older demographics bear the brunt of financial devastation: 40% of men aged 65–74 lost $751–$1,000, while half of women in the same cohort lost $2,501–$5,000.

The most severe losses occurred among 45–54-year-olds, with 10% reporting damages exceeding $10,000.

AI tools enable hyper-realistic phishing campaigns, with 55% of respondents noting increased scam realism compared to prior years.

Deepfake voice clones mimicking IRS agents and AI-generated emails replicating tax software branding (e.g., TurboTax, H&R Block) have blurred the line between legitimate and fraudulent communications.

Anatomy of a Modern Tax Scam

A typical attack begins with urgent SMS or email alerts claiming rejected refunds or back taxes owed.

These messages often include malicious links to credential-harvesting pages or fake helplines.

For example:

xml<!-- Example phishing link embedded in a scam email -->  
<a href="http://irs-tax-refund-claim[.]com">Click to Verify Your Refund</a>  

Once victims engage, fraudsters exploit stolen Social Security numbers (SSN) or bank details to file fraudulent returns or drain accounts.

Cryptocurrency payment demands—three times more likely to target men—add layers of anonymity for criminals.

Defensive Strategies for Taxpayers

To mitigate risks, cybersecurity experts recommend:

  1. Early Filing: Submit returns before cybercriminals can hijack W-2 data.
  2. Dark Web Monitoring: Use services like McAfee+ to track SSNs, bank accounts, or email addresses exposed in breaches.
  3. Phishing Vigilance: Scrutinize URLs in unsolicited messages. Legitimate IRS communications exclusively use IRS.gov domains and never initiate contact via text or social media.
  4. Multi-Factor Authentication (MFA): Enable MFA on tax software accounts to block unauthorized access.
  5. Spoofing Countermeasures: Manually type tax platform URLs instead of clicking embedded links to avoid spoofed sites like TurboTax-refund[.]net.

Regulatory and Technological safeguards

The IRS continues to enforce its Taxpayer First Act protocols, requiring biometric verification for tax preparer accounts.

Meanwhile, AI-powered tools now flag suspicious communications by analyzing linguistic patterns (e.g., urgency-driven keywords like “immediate action” or “account suspension”).

Despite these measures, 87% of Americans remain concerned about AI’s role in amplifying fraud.

As tax scams evolve, proactive defense—combining human skepticism with advanced cybersecurity—is critical to safeguarding refunds and identities in 2025.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...