The Federal Bureau of Investigation (FBI), through its Internet Crime Complaint Center (IC3), has issued a Public Service Announcement (PSA) on March 9, 2026, warning of a widespread phishing scam targeting individuals and businesses across the United States. Threat actors are impersonating city and county officials to fraudulently collect fees associated with planning and zoning permits. This scheme is particularly effective as it leverages publicly accessible permit data to lend credibility to the fraudulent communications. The FBI urges extreme caution and verification before making any payments for government services, especially when requested via unconventional methods.
This nationwide phishing campaign represents a sophisticated form of spear-phishing. The attackers conduct reconnaissance by scraping public records for active planning and zoning permit applications. This allows them to craft highly targeted and convincing emails that include legitimate details such as:
By including this accurate information, the fraudulent emails bypass the skepticism typically associated with generic phishing attempts. The timing of the emails may also coincide with legitimate stages of the permitting process, further lowering the target's defenses. The goal is simple: trick the victim into paying a fake invoice for a purported permit fee.
The attack relies primarily on social engineering and impersonation rather than technical exploits. Key characteristics of the attack include:
T1592 - Gather Victim Host Information.T1566 - Phishing.@usa.com.The primary impact is financial loss for individuals and businesses, which can range from hundreds to thousands of dollars per incident. Beyond direct financial loss, victims may experience significant delays in their legitimate permitting process while they resolve the issue. This can have cascading effects on construction projects and business operations. The scam also erodes public trust in government communications and processes. The nationwide scope indicates a well-organized effort targeting a wide range of victims in the construction and real estate sectors.
.gov or other official state/local domain..gov TLDs.Educate users, especially those in finance and administration, to identify and report sophisticated phishing attempts and to independently verify payment requests.
Use email filtering solutions to analyze and block emails containing suspicious links or originating from domains known for impersonation.
Configure email systems to display external email warnings and to perform strict DMARC, DKIM, and SPF checks to identify spoofed emails.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats