Security researchers at Proofpoint have uncovered a massive, multi-national phishing campaign timed to coincide with tax season. The campaign, attributed to the notorious cybercrime group Scattered Spider, is targeting individuals and businesses in the United States, the United Kingdom, and Canada. Attackers are sending fraudulent emails and SMS messages (smishing) that convincingly impersonate major tax agencies: the U.S. Internal Revenue Service (IRS), the U.K. His Majesty's Revenue and Customs (HMRC), and the Canada Revenue Agency (CRA). The lures promise significant tax refunds to trick victims into visiting sophisticated phishing sites and surrendering sensitive personal and financial data. The scale and quality of the campaign pose a significant threat to the public in all three countries.
The campaign's effectiveness relies on social engineering and technical evasion:
T1566.002 - Phishing: Spearphishing Link: The primary delivery mechanism for the phishing attack.T1608.001 - Stage Capabilities: Upload Malware: The attackers stage and maintain their sophisticated phishing kits on compromised or attacker-controlled infrastructure.T1598.003 - Phishing for Information: Spearphishing Link: The core of the attack is to trick users into entering information on a fraudulent website.T1204.002 - User Execution: Malicious Link: The attack relies on the user clicking the malicious link in the email or SMS.This campaign poses a significant risk of identity theft and financial fraud to a large population. The theft of comprehensive PII, including SSNs and banking details, allows criminals to open fraudulent lines of credit, file fake tax returns to steal legitimate refunds, and drain bank accounts. For businesses, compromised employee credentials can lead to follow-on attacks, including Business Email Compromise (BEC) and ransomware. The campaign also erodes public trust in official government communications.
D3-UA: URL Analysis is the primary defensive technique, used by security products to inspect links and identify malicious destinations. D3-DNSDL: DNS Denylisting is used to block access to the phishing domains once they are identified.The primary defense is to train users to be skeptical of unsolicited communications and to never click links in unexpected emails or texts about financial matters.
Utilize web filters and email security gateways to analyze and block access to known phishing sites and malicious links.
While not a direct defense against the information theft itself, having MFA on banking and email accounts can prevent attackers from using the stolen credentials.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats