Cybersecurity firm Proofpoint has released an advisory detailing a significant increase in cyber threats leveraging the 2026 tax season. Researchers have identified over one hundred distinct campaigns using tax-related themes as a lure for a wide range of malicious activities. These operations include credential phishing, Business Email Compromise (BEC), and the delivery of malware. A particularly concerning trend is the deployment of legitimate Remote Monitoring and Management (RMM) tools, which attackers use to establish persistent, long-term access to victim networks. These campaigns are global in scope, with specific threat actors like the newly identified TA2730 targeting organizations in Japan and other parts of Asia. The effectiveness of these campaigns lies in their ability to exploit the sense of urgency and legitimacy associated with official tax communications.
The campaigns leverage the universal and time-sensitive nature of tax season to manipulate human behavior. Attackers are using a diverse set of social engineering tactics:
T1219 - Remote Access Software) that may not be flagged by traditional security software.These campaigns are not limited to one region, with attacks observed targeting users in Japan, Canada, Australia, Singapore, and Switzerland, among others.
T1566 - Phishing, delivered via email. The lures are carefully crafted to appear as legitimate tax-related communications, increasing their success rate.T1204.002 - User Execution: Malicious File) or enabling macros in a document. For RMM deployment, it involves social engineering the user to approve the installation.T1539 - Steal Web Session Cookie and password theft). In BEC attacks, the goal is to acquire sensitive documents containing Personally Identifiable Information (PII).W-2, W-9, W-8BEN) that come from external domains or public email providers (e.g., Gmail, Outlook).Inbound Traffic Filtering.Executable Allowlisting.The primary defense against phishing and social engineering is a well-trained and vigilant workforce.
Use email and web filters to block malicious attachments, links, and known phishing sites.
MFA is the best defense against the use of stolen credentials, preventing attackers from logging in even if they succeed in a phishing attack.
Mapped D3FEND Techniques:
Prevent users from installing unauthorized software, including legitimate RMM tools that can be abused by attackers.
To combat the high volume of tax-themed phishing emails, organizations must deploy a multi-layered email security gateway. This system should perform several checks on inbound mail: scanning for malicious attachments, sandboxing URLs to check for phishing sites, analyzing email headers for signs of spoofing (DMARC, DKIM, SPF), and using impersonation detection algorithms to identify BEC attempts. For example, it should flag an email that appears to be from the CEO but originates from a public email address or has a 'reply-to' address pointing to an external domain. This automated filtering is the first and most important line of defense to prevent malicious emails from ever reaching an employee's inbox.
To counter the threat of unauthorized RMM tool installation, organizations should implement a policy of executable allowlisting. This prevents any software that is not on a pre-approved list from running. In the context of this threat, the organization would create an inventory of all legitimate, company-sanctioned software. Any attempt by a user to install an RMM tool like AnyDesk or TeamViewer after being tricked by a phishing email would be automatically blocked by the operating system or an application control agent. This shifts the security posture from a reactive 'block known bad' model to a proactive 'allow known good' model, which is far more effective against the abuse of legitimate software.
For BEC attacks requesting sensitive forms like W-2s, a technical control must be paired with user training. A Data Loss Prevention (DLP) solution can be configured to detect and block outbound emails containing attachments or content that matches the pattern of a W-2 or W-9 form, especially if the recipient is an external or public email address. This creates a safety net to catch human error. The policy should be set to alert the security team and the sender's manager, providing an opportunity to verify the request's legitimacy before sensitive employee PII leaves the organization. This directly mitigates the impact of a successful social engineering attack on an HR or finance employee.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats