As the United States approaches Tax Day on April 15, cybersecurity experts have uncovered a series of sophisticated phishing campaigns leveraging tax-related themes to exploit unsuspecting users.
Microsoft has identified these campaigns as employing advanced redirection techniques such as URL shorteners and QR codes embedded in malicious attachments to evade detection.
By abusing legitimate services like file-hosting platforms and business profile pages, attackers aim to deliver malware and steal sensitive credentials.
The phishing attacks are linked to the RaccoonO365 phishing-as-a-service (PhaaS) platform, as well as malware families such as Remcos, Latrodectus, BruteRatel C4 (BRc4), AHKBot, and GuLoader.
These tools enable attackers to gain unauthorized access, deploy payloads, and conduct further malicious activities.
Microsoft observed several campaigns exploiting tax-related fears and obligations to deceive users.
One campaign, attributed to the threat actor Storm-0249, targeted thousands of users with emails claiming issues with their IRS filings.
These emails contained PDF attachments with embedded DoubleClick URLs that redirected users through Rebrandly shortened links to fake DocuSign pages.
If users interacted with these pages, they were either served malicious JavaScript files leading to malware installation or benign decoy files based on filtering rules.
Another campaign used QR codes embedded in PDF attachments sent to over 2,300 organizations between February 12 and 28, 2025.
The QR codes directed recipients to phishing pages mimicking Microsoft 365 login portals designed to steal credentials.
These emails were disguised under display names such as “EMPLOYEE TAX REFUND REPORT” and “Tax Strategy Update Campaign Goals,” adding credibility to the attack.
The malware used in these campaigns demonstrates advanced capabilities:
In a targeted campaign hackers focused on CPAs and accountants in the U.S., employing rapport-building tactics before delivering malicious PDFs.
These PDFs contained URLs leading to ZIP files hosted on Dropbox. Once opened, the files executed PowerShell scripts that installed GuLoader and Remcos malware.
To combat these threats, Microsoft recommends organizations implement robust security measures:
These campaigns highlight the importance of vigilance during tax season, as cybercriminals continue to refine their methods using legitimate services and advanced malware frameworks.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been identified…
AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats and…
A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions, potentially…
The cybersecurity realm has encountered a formidable adversary with the emergence of CatB ransomware, also…
In a major victory against cybercrime, law enforcement agencies across North America and Europe have…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued alerts regarding two actively exploited vulnerabilities…