As the U.S. tax season is underway, Microsoft Threat Intelligence has observed a major surge in phishing campaigns that leverage tax-related themes to compromise organizations and individuals. Attackers are impersonating the IRS and using lures based on common tax forms (W-2, Form 1099) to build credibility and urgency. These campaigns have multiple objectives, including deploying the ScreenConnect remote access tool for persistent access, and using Phishing-as-a-Service (PhaaS) kits like Energy365 and SneakyLog to steal credentials. The campaigns are large-scale, with one operation targeting over 10,000 organizations. Attackers are also using novel techniques, such as embedding QR codes in documents, to evade traditional email security.
Microsoft has observed several distinct but related campaigns:
ScreenConnect Distribution Campaign:
T1219 - Remote Access Software technique. Gaining persistent remote access is the primary goal.Energy365 PhaaS Campaign:
T1566.002 - Spearphishing Link).QR Code (Qishing) Campaign:
2025_Employee_W-2 .docx.T1204.002 - Malicious File) is not macro-enabled but contains an embedded QR code. Email security gateways often do not scan QR codes within attachments. If a user scans the QR code with their mobile device, it takes them to a phishing page powered by the SneakyLog kit, which is designed to steal their login credentials.2025_Employee_W-2 .docx.M1032 - Multi-factor Authentication).Proofpoint reports over 100 distinct tax season campaigns, leveraging RMM tools for persistence, expanding globally with BEC attacks, and identifying new actor TA2730.
Training users to identify and report phishing attempts, especially those with urgent, seasonal lures like tax documents, is a critical first line of defense.
MFA is the most effective control to prevent account takeover, even if a user's credentials are stolen via a phishing kit.
Mapped D3FEND Techniques:
Using application control to prevent the installation of unauthorized remote access software like ScreenConnect can stop attackers from gaining persistent access.
The primary goal of the Energy365 and SneakyLog phishing campaigns is to steal credentials. The single most effective countermeasure is the mandatory enforcement of Multi-Factor Authentication (MFA) across all externally facing services, especially email (Office 365, Google Workspace) and VPN. Even if a user is tricked into entering their password on a phishing page, the attacker cannot complete the login without the second factor. For maximum security, organizations should prioritize phishing-resistant MFA methods like FIDO2 security keys or device-based biometrics over less secure methods like SMS or one-time passcodes, which are susceptible to adversary-in-the-middle attacks. This control effectively neutralizes the threat of credential-harvesting phishing.
To counter the threat of malware distribution, such as the ScreenConnect campaign, organizations should implement Executable Allowlisting. Instead of trying to block a constantly changing list of malicious files, allowlisting operates on a 'default-deny' principle, only allowing known, approved applications to run. This would prevent an unauthorized remote access tool like ScreenConnect from being installed and executed, even if a user is tricked into downloading it. Implementing allowlisting can be complex, but starting with high-risk user groups or critical servers can provide significant security benefits. This control directly stops the attacker from achieving their goal of establishing persistent access on the endpoint.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats