Scattered Spider Launches Massive Tax-Season Phishing Campaign Impersonating IRS, HMRC, and CRA

Widespread Phishing Campaign by "Scattered Spider" Targets Taxpayers in US, UK, and Canada

HIGH
February 23, 2026
4m read
PhishingThreat ActorCyberattack

Related Entities

Threat Actors

Scattered Spider

Organizations

ProofpointInternal Revenue Service (IRS)His Majesty's Revenue and Customs (HMRC)Canada Revenue Agency (CRA)

Full Report

Executive Summary

Security researchers at Proofpoint have uncovered a massive, multi-national phishing campaign timed to coincide with tax season. The campaign, attributed to the notorious cybercrime group Scattered Spider, is targeting individuals and businesses in the United States, the United Kingdom, and Canada. Attackers are sending fraudulent emails and SMS messages (smishing) that convincingly impersonate major tax agencies: the U.S. Internal Revenue Service (IRS), the U.K. His Majesty's Revenue and Customs (HMRC), and the Canada Revenue Agency (CRA). The lures promise significant tax refunds to trick victims into visiting sophisticated phishing sites and surrendering sensitive personal and financial data. The scale and quality of the campaign pose a significant threat to the public in all three countries.

Threat Overview

  • Threat Actor: Scattered Spider (also known for credential theft and SIM swapping).
  • Attack Type: Phishing and Smishing.
  • Targets: General public and businesses in the USA, UK, and Canada.
  • Impersonated Entities: IRS, HMRC, and CRA.
  • Lure: Notification of eligibility for a large tax refund.
  • Objective: Mass theft of Personally Identifiable Information (PII) and financial data, including full names, addresses, Social Security Numbers (or equivalents), birth dates, and banking details.
  • Infrastructure: The campaign uses high-quality, geo-targeted phishing kits that are difficult for standard email filters to detect.

Technical Analysis

The campaign's effectiveness relies on social engineering and technical evasion:

  1. Distribution: The attackers use large-scale email and SMS blasts. The messages are crafted to look official, using logos and language copied from legitimate tax agency communications.
  2. Geo-Targeting: The links within the messages direct victims to a routing server that identifies the victim's geographic location based on their IP address.
  3. Phishing Portal: The victim is then redirected to a high-fidelity phishing portal that is a near-perfect replica of the official tax agency website for their country (e.g., a U.S. victim sees a fake IRS site).
  4. Data Harvesting: The victim is presented with a multi-page form that requests an exhaustive amount of personal and financial information under the guise of processing their refund.
  5. Evasion: The phishing kits employ techniques to evade detection, such as dynamically generating URLs and using content to bypass spam filters.

MITRE ATT&CK TTPs

Impact Assessment

This campaign poses a significant risk of identity theft and financial fraud to a large population. The theft of comprehensive PII, including SSNs and banking details, allows criminals to open fraudulent lines of credit, file fake tax returns to steal legitimate refunds, and drain bank accounts. For businesses, compromised employee credentials can lead to follow-on attacks, including Business Email Compromise (BEC) and ransomware. The campaign also erodes public trust in official government communications.

Detection & Response

  • Email Security Gateways: Use email security solutions with advanced phishing detection capabilities that can analyze URLs and sender reputation.
  • URL Analysis: Security teams should analyze suspicious URLs reported by users. Tools that can render a webpage in a sandbox and analyze its content are valuable for identifying phishing sites.
  • Web Filtering: Block access to known phishing domains and categories. The domains used in these campaigns are often newly registered.
  • D3FEND: D3-UA: URL Analysis is the primary defensive technique, used by security products to inspect links and identify malicious destinations. D3-DNSDL: DNS Denylisting is used to block access to the phishing domains once they are identified.

Mitigation

  1. Public and Employee Awareness: The number one mitigation is education. Remind users that tax agencies like the IRS, HMRC, and CRA will never initiate contact via email, text, or social media to request personal or financial information.
  2. Do Not Click Links: Advise users to never click on links in unsolicited emails or texts, especially those related to finances or taxes. Instead, they should always navigate directly to the official government website by typing the address into their browser.
  3. Report Phishing: Encourage users to report suspicious messages to the respective tax agencies and their internal IT/security department.
  4. SMS Spam Filtering: Mobile carriers and security apps offer services to filter and block known spam and smishing messages.

Timeline of Events

1
February 23, 2026
This article was published

MITRE ATT&CK Mitigations

The primary defense is to train users to be skeptical of unsolicited communications and to never click links in unexpected emails or texts about financial matters.

Utilize web filters and email security gateways to analyze and block access to known phishing sites and malicious links.

Mapped D3FEND Techniques:

While not a direct defense against the information theft itself, having MFA on banking and email accounts can prevent attackers from using the stolen credentials.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingSmishingScattered SpiderIRSHMRCCRATax Scam

📢 Share This Article

Help others stay informed about cybersecurity threats