Tax Season Phishing Frenzy: Scammers Use IRS and W-2 Lures to Spread Malware

Microsoft Warns of Surge in Tax-Themed Phishing Campaigns Distributing Malware

MEDIUM
March 8, 2026
March 31, 2026
5m read
PhishingMalware

Related Entities(initial)

Organizations

Other

ScreenConnectEnergy365SneakyLog

Full Report(when first published)

Executive Summary

As the U.S. tax season is underway, Microsoft Threat Intelligence has observed a major surge in phishing campaigns that leverage tax-related themes to compromise organizations and individuals. Attackers are impersonating the IRS and using lures based on common tax forms (W-2, Form 1099) to build credibility and urgency. These campaigns have multiple objectives, including deploying the ScreenConnect remote access tool for persistent access, and using Phishing-as-a-Service (PhaaS) kits like Energy365 and SneakyLog to steal credentials. The campaigns are large-scale, with one operation targeting over 10,000 organizations. Attackers are also using novel techniques, such as embedding QR codes in documents, to evade traditional email security.

Threat Overview

  • Attack Type: Phishing, Malware Distribution, Credential Harvesting.
  • Themes: U.S. Tax Season, IRS notifications, W-2 forms, Form 1099.
  • Payloads:
    • ScreenConnect: A legitimate remote access tool abused by attackers for persistence.
    • Energy365: A Phishing-as-a-Service (PhaaS) kit.
    • SneakyLog: A phishing kit used for credential theft, often delivered via QR codes.
  • Targets: Broadly targeted, but with a focus on accounting professionals, financial services, technology, retail, and healthcare sectors.

Technical Analysis

Microsoft has observed several distinct but related campaigns:

  1. ScreenConnect Distribution Campaign:

    • Scale: Targeted over 10,000 organizations, primarily in the U.S.
    • Lure: IRS-themed emails.
    • TTP: The emails contain malicious attachments or links that, when opened, lead to the installation of the ScreenConnect remote access tool. This is a classic T1219 - Remote Access Software technique. Gaining persistent remote access is the primary goal.
  2. Energy365 PhaaS Campaign:

    • Lure: Highly customized emails related to Certified Public Accountants (CPAs).
    • TTP: The emails contain links to a phishing page hosted by the Energy365 kit. This is a credential harvesting attack (T1566.002 - Spearphishing Link).
  3. QR Code (Qishing) Campaign:

    • Lure: Emails with the subject "2025 Employee Tax Docs" containing a Word document named 2025_Employee_W-2 .docx.
    • TTP: This campaign uses multiple layers of obfuscation. The email itself is benign. The attached Word document (T1204.002 - Malicious File) is not macro-enabled but contains an embedded QR code. Email security gateways often do not scan QR codes within attachments. If a user scans the QR code with their mobile device, it takes them to a phishing page powered by the SneakyLog kit, which is designed to steal their login credentials.

Impact Assessment

  • Credential Compromise: Successful phishing attacks lead to the theft of user credentials, which can be used to access sensitive corporate data, email accounts, and other systems.
  • Persistent Access & Ransomware: The installation of remote access tools like ScreenConnect provides attackers with a persistent foothold in the network. This access is often sold to other cybercriminals or used as a staging point for more severe attacks, including ransomware deployment.
  • Financial Fraud: By compromising accounting professionals or gaining access to financial data, attackers can conduct wire transfer fraud or other forms of financial theft.

Cyber Observables for Detection

  • Email Subjects: Monitor for emails with subjects like "2025 Employee Tax Docs," "IRS Notification," or related to "Form 1099."
  • File Names: Be suspicious of attachments with names like 2025_Employee_W-2 .docx.
  • Process Monitoring: Look for unexpected installations of legitimate remote access tools like ScreenConnect, AnyDesk, or TeamViewer, especially if initiated via an email attachment.
  • Network Traffic: Monitor for network connections to known PhaaS infrastructure or newly registered domains containing keywords like "tax" or "irs."

Detection & Response

  1. Email Security Gateway: Ensure your email security solution has advanced threat protection capabilities, including attachment sandboxing and URL analysis. Configure policies to flag or block emails containing tax-related keywords from external senders.
  2. EDR/XDR: Use an EDR solution to detect and block the installation of unauthorized remote access software. Create alerts for processes associated with tools like ScreenConnect being installed outside of a standard IT deployment.
  3. User Training: This is the most critical defense. Train users to be extremely cautious with any tax-related emails. Specifically warn them about QR code-based phishing (qishing) and instruct them never to scan QR codes from untrusted sources.
  4. Browser Protection: Use modern web browsers with built-in phishing and malware protection, such as Microsoft Defender SmartScreen or Google Safe Browsing.

Mitigation

  1. Multi-Factor Authentication (MFA): Enforce MFA on all accounts, especially for email and financial systems. This is the single most effective mitigation against credential theft from phishing attacks (M1032 - Multi-factor Authentication).
  2. Application Control: Use application control solutions to block the execution of unauthorized software, including unapproved remote access tools.
  3. Block QR Codes in Email: If technically feasible, configure email gateways or client-side rules to block or flag emails containing QR codes, as they are an emerging and effective evasion technique.
  4. Internal Communication: Proactively communicate with employees about how your organization distributes official tax documents (e.g., via a secure internal portal) to help them recognize fraudulent external emails.

Timeline of Events

1
March 8, 2026
This article was published

Article Updates

March 31, 2026

Proofpoint reports over 100 distinct tax season campaigns, leveraging RMM tools for persistence, expanding globally with BEC attacks, and identifying new actor TA2730.

Update Sources:

MITRE ATT&CK Mitigations

Training users to identify and report phishing attempts, especially those with urgent, seasonal lures like tax documents, is a critical first line of defense.

MFA is the most effective control to prevent account takeover, even if a user's credentials are stolen via a phishing kit.

Mapped D3FEND Techniques:

Using application control to prevent the installation of unauthorized remote access software like ScreenConnect can stop attackers from gaining persistent access.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary goal of the Energy365 and SneakyLog phishing campaigns is to steal credentials. The single most effective countermeasure is the mandatory enforcement of Multi-Factor Authentication (MFA) across all externally facing services, especially email (Office 365, Google Workspace) and VPN. Even if a user is tricked into entering their password on a phishing page, the attacker cannot complete the login without the second factor. For maximum security, organizations should prioritize phishing-resistant MFA methods like FIDO2 security keys or device-based biometrics over less secure methods like SMS or one-time passcodes, which are susceptible to adversary-in-the-middle attacks. This control effectively neutralizes the threat of credential-harvesting phishing.

To counter the threat of malware distribution, such as the ScreenConnect campaign, organizations should implement Executable Allowlisting. Instead of trying to block a constantly changing list of malicious files, allowlisting operates on a 'default-deny' principle, only allowing known, approved applications to run. This would prevent an unauthorized remote access tool like ScreenConnect from being installed and executed, even if a user is tricked into downloading it. Implementing allowlisting can be complex, but starting with high-risk user groups or critical servers can provide significant security benefits. This control directly stops the attacker from achieving their goal of establishing persistent access on the endpoint.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingTax SeasonIRSMalwareScreenConnectQR CodeQishingMicrosoft

📢 Share This Article

Help others stay informed about cybersecurity threats