Protect Your Tax Practice from Phishing Attempts

Understanding the Attack: Spear Phishing

Tax professionals should be on high alert for a new wave of phishing emails masquerading as potential clients seeking tax preparation services. These deceptive messages typically come from mismatched email addresses, provide minimal contact information, and are signed with only a first name. The scammers aim to establish communication with tax preparers, ultimately attempting to trick them into clicking malicious links or sharing access to secure document portals.

To protect yourself and your practice, implement a strict new client verification process that includes phone consultations and formal identification before sharing any sensitive information or portal access. Never click links or download attachments from unverified senders, and consider establishing a standardized intake process that requires potential clients to initiate services through your firm's website or office phone number. Remember: legitimate new clients will understand and appreciate your commitment to security.

What is Spear Phishing?

This type of targeted attack is known as "spear phishing," or more specifically, "Business Email Compromise" (BEC) when targeting professional services. Unlike traditional phishing attempts that cast a wide net with generic messages, spear phishing involves carefully researched, highly targeted communications aimed at specific professionals or organizations.

Why Tax Professionals Are Targeted

Tax preparers are particularly valuable targets due to their access to sensitive financial information and tax filing systems. The FBI and IRS have issued specific warnings about these attacks, as criminals recognize the potential value of compromising a tax professional's systems. The timing of these attacks often aligns strategically with tax season or preparation periods, when professionals expect to receive new client inquiries.

The Sophisticated Approach

What makes this attack notably sophisticated is its patient, methodical approach. Rather than immediately attempting to deploy malware or gain system access, these attackers first aim to establish a seemingly legitimate business relationship. They demonstrate knowledge of industry terminology, standard business processes, and professional norms. In this case, the attacker shows familiarity with tax preparation workflows, client intake procedures, and common practices like reviewing previous years' returns.

The End Game

The ultimate goal of these attacks is typically to either deliver malware through document sharing, gain access to client portals, or extract sensitive information that can be used for identity theft or financial fraud. By first establishing trust and legitimacy, attackers increase their chances of success when they eventually deploy their actual attack. This patient approach makes spear phishing particularly dangerous and difficult to detect without proper awareness and verification procedures.

Sample Phishing Attempt

From: Sarah <kraig.kubicek@avataracloud.com>
🚩 Sender name doesn't match email address
Subject: 2024 Taxes New Intake
I hope this message finds you well and that you had a wonderful Thanksgiving. My name is Sarah, and I am reaching out to inquire about your services for preparing individual tax returns for the 2024 tax year.
🚩 Only first name provided, no last name or contact details
As a new client, I would greatly appreciate the opportunity to discuss how you can assist me with my tax filing needs. To provide some context, I am seeking professional assistance to ensure that my tax return is filed accurately and efficiently. My previous tax preparer has retired and discontinued their practice, prompting me to seek a new professional to handle my taxes moving forward. Could you kindly confirm if you are currently accepting new clients for the 2024 tax season? If so, I would appreciate guidance on the next steps to get started. Additionally, I would like to know which documents or information you require to facilitate a smooth and seamless process. I am happy to provide a copy of my 2023 tax filing for your review if that would be helpful.
🚩 Early attempt to share documents
Thank you in advance for your time and assistance. I look forward to the possibility of working with you. Best regards, Sarah

Recognition

Verify Sender Identity

Watch for mismatches between display names and email addresses. Be wary of unusual email domains.

  • Look for email addresses with slight misspellings (like microsft.com or paypa1.com)
  • Be suspicious of personal email domains (gmail, yahoo) for business communications
  • Watch for names that don't match company domains (e.g., "IRS Agent" using gmail.com)
  • Check for unusual characters or numbers in domain names

Red Flags

Be suspicious of minimal identifying information (first name only) and lack of contact details.

  • Urgency or pressure to act quickly ("immediate action required")
  • Generic greetings like "Dear Sir/Madam" or "Dear Tax Professional"
  • Poor grammar or spelling inconsistent with professional communication
  • Requests to change payment or contact information
  • Requests for sensitive information early in the conversation

Safe Handling

Never Click Unknown Links

Avoid clicking links or downloading attachments from unverified senders.

  • Hover over links to preview URLs before clicking
  • Look for secure (https://) connections
  • Type known web addresses directly instead of clicking links
  • Be wary of shortened URLs or unexpected redirects
  • Don't open unexpected attachments, even from known senders

Verify Before Sharing

Require phone consultations and formal identification before sharing portal access.

  • Establish a phone verification process for new clients
  • Request government-issued ID before sharing sensitive information
  • Use secure client portals rather than email for document sharing
  • Verify phone numbers against public records or official sources
  • Document your verification steps

Email Protocol

Standard Response

Use a standard reply directing potential clients to call your office or visit your website.

  • Create templated responses for new client inquiries
  • Include office contact information and physical address
  • Direct potential clients to your official website
  • Specify your firm's intake procedures
  • Never include sensitive links in initial responses

Email Filters

Set up filters to catch common phishing patterns.

  • Set up filters for common phishing keywords
  • Create rules for emails with mismatched sender names
  • Filter suspicious attachment types
  • Flag emails from new senders with urgency keywords
  • Monitor filtered messages regularly

Documentation

Keep Records

Save suspicious emails and report significant attempts to authorities.

  • Screenshot suspicious emails before deleting
  • Log phishing attempts with dates and details
  • Document any client impersonation attempts
  • Report significant attempts to IRS, FBI, and FTC
  • Maintain an incident response log

Staff Training

Share examples with your staff to help them recognize similar attempts.

  • Schedule regular security awareness training
  • Share real-world phishing examples
  • Test staff with simulated phishing attempts
  • Create clear reporting procedures
  • Review and update security protocols regularly
🔔 Stay Alert! Protect your practice from sophisticated phishing attempts targeting tax preparers.