Sunday, April 13, 2025
HomeCyber AttackNew Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

Published on

SIEM as a Service

Follow Us on Google News

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of IRS-themed scams.

Research from McAfee Labs has revealed a sharp increase in fraudulent activities targeting mobile devices, with scammers using deceptive text messages and fake IRS websites to steal personal and financial information.

Mobile Devices
Example of a fake IRS claim website 

Mobile Attacks Dominate Tax Scam Landscape

According to McAfee’s findings, mobile users are the primary targets of these scams, with 76% of tax-related phishing campaigns in 2024 delivered via text messages.

- Advertisement - Google News

These messages often include shortened URLs that mask their true destinations, making it harder for users to identify malicious links.

Mobile Devices
Scam texts that weave “irs.gov” into a malicious link 

Many of these fraudulent links mimic official IRS websites, such as “irs.gov.tax-helping[.]com,” tricking taxpayers into believing they are legitimate.

Scammers also employ urgent or fear-based tactics to manipulate victims.

Messages may claim that refunds are on hold or threaten legal action for unpaid taxes.

In reality, the IRS does not use such methods to communicate with taxpayers, making these red flags for potential fraud.

The Mechanics of IRS Scams

The scams typically unfold in two stages.

First, victims receive a message purporting to be from the IRS or a tax preparation service.

The message includes an urgent call to action and a link to a fake website designed to resemble official IRS pages.

Once victims click the link, they are prompted to provide sensitive information such as Social Security Numbers (SSNs), bank account details, or login credentials.

This stolen data can be used for various forms of fraud, including filing false tax returns to claim refunds, identity theft to open new credit accounts, or even reselling the information on dark web marketplaces.

The consequences for victims can be severe, often requiring months or years to resolve.

McAfee’s analysis highlights that these scams are not isolated incidents but part of highly coordinated campaigns.

For instance, one phishing campaign in 2024 accounted for 17.3% of all tax-related blocked URLs.

Scammers also impersonate well-known tax preparation and software companies, further complicating efforts to distinguish legitimate communications from fraudulent ones.

To safeguard against these attacks, taxpayers should remain vigilant and adopt proactive measures:

  • Verify Communications: The IRS primarily contacts individuals via physical mail and does not request personal information through text messages or emails.
  • Avoid Clicking Links: Instead of clicking on links in unsolicited messages, visit official websites directly by typing their URLs into your browser.
  • Use Security Tools: Employ cybersecurity solutions that detect phishing attempts and block malicious websites.
  • File Early: Submitting your tax return early reduces the risk of scammers filing a fraudulent return in your name.
  • Monitor Credit Activity: Regularly check your credit report for unusual activity and set up alerts for unauthorized transactions.

The surge in IRS-themed scams underscores the importance of heightened awareness during tax season.

By recognizing common tactics used by cybercriminals and taking preventative measures, taxpayers can protect themselves from falling victim to these sophisticated schemes.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...