Overview
Every April, phishing campaigns impersonating the Internal Revenue Service (IRS) surge around the tax-filing deadline. Attackers exploit the pressure of tax season to trick victims into surrendering bank details, Social Security numbers, driver's license numbers, and tax-preparer login credentials. Campaigns arrive via email, SMS, and phone, and often combine multiple channels for credibility.
OpenEFA is actively detecting and quarantining the email variants of these campaigns.
Known Campaign Variants
Victims receive an email claiming the IRS has identified an unclaimed refund and asking them to "verify" their direct-deposit information. The landing page collects bank routing number, account number, SSN, and date of birth.
Typical subjects: Your IRS refund notice, Action required — tax refund pending, Unclaimed Federal Tax Refund
Emails impersonating real IRS letter formats (CP14, CP2000, CP501, CP504) claiming an unpaid balance with a short deadline and threats of wage garnishment, asset seizure, or legal action. Real IRS notices are sent via USPS mail, never initiated by email.
Typical subjects: IRS Notice CP2000 — Response Required, Final Balance Due Notice, Tax Lien Warning
Emails pretending to be TurboTax, H&R Block, Jackson Hewitt, or a recipient's real tax preparer, attempting to steal login credentials or get the victim to "upload" their W-2, 1099, or completed 1040 to an attacker-controlled portal. Filed returns can be hijacked to redirect refunds.
Typical subjects: Your tax return is ready for review, Action needed to complete your filing, Verify your TurboTax account
SMS variant directs recipients to call a provided number where a fake "IRS agent" demands immediate payment via gift card, prepaid debit card, wire transfer, or cryptocurrency. Threats include arrest, deportation, or license suspension. This is a pure social-engineering variant designed to bypass email filters entirely.
Typical messages: IRS: Your tax refund is pending. Call 1-XXX..., IRS Final Warning — legal action pending
Common Characteristics
All variants share the same attack pattern:
- Urgency — "Respond within 24 hours", "Final notice", "Immediate action required"
- Threats — arrest warrants, asset seizure, deportation, wage garnishment, license suspension (none of which are how the real IRS operates)
- Lookalike domains —
irs-refund[.]com,irs.gov.xyz,treasury-refund[.]net, or typo-squats of legitimate tax-prep brands - Unusual payment demands — gift cards, prepaid debit cards, wire transfer, cryptocurrency (the real IRS accepts only Direct Pay, EFTPS, checks, or cards processed through authorized payment processors on irs.gov)
- PII requests — SSN, DOB, DL number, bank routing details (the real IRS already has your SSN and DOB on file)
Red Flags to Watch For
- Any email or SMS from "the IRS" — The IRS initiates contact via USPS mail. They do not email or text taxpayers first, ever.
- Gift card or crypto payment demands — The IRS never accepts payment in iTunes cards, Google Play cards, Amazon gift cards, Bitcoin, or wire transfers to personal accounts.
- Non-
.govdomains — Legitimate IRS links are atirs.gov. Watch for lookalikes using.com,.xyz,.net, or extra words (irs-portal.com,tax-refund-irs.net). - Threats of arrest or deportation — The IRS follows due process with written notices, appeals windows, and court proceedings. Phone and email threats of immediate arrest are scams.
- Requests to "verify" SSN, DL, or bank details — The IRS already has this information. Any email asking you to confirm it is a credential-harvesting attempt.
- Unexpected refund offers — An unsolicited "you have an unclaimed refund" message is a classic lure; real refunds follow your filed return.
- Bad grammar and formatting — Genuine IRS correspondence is professionally edited. Awkward phrasing, unusual capitalization, or broken formatting are giveaways.
What You Should Do
- Do not click any links in the message, and do not open attached tax forms or "IRS letter" PDFs
- Do not reply or call any phone number in the message
- Do not provide PII or bank details via email or SMS, ever
- Verify independently — Log in at irs.gov/account directly, or call the official IRS line at 1-800-829-1040
- Forward phishing emails to phishing@irs.gov, then delete
- Report SMS scams by forwarding to 7726 (SPAM) and reporting to the FTC at reportfraud.ftc.gov
- Report impersonation to the Treasury Inspector General (TIGTA) at tigta.gov
How OpenEFA Protects You
OpenEFA's email security platform detects and quarantines IRS and tax-season phishing emails using multiple layers of analysis:
- URL Reputation — Identifies lookalike IRS, Treasury, and tax-prep domains
- NLP Content Analysis — Detects urgency language, balance-due threats, and refund-lure patterns
- Domain Authentication — Verifies SPF, DKIM, and DMARC to catch spoofed
@irs.govsenders - Brand Impersonation Detection — Flags emails impersonating the IRS, Treasury, and major tax-prep providers
- Seasonal Campaign Signals — Recognizes the tax-season phishing surge across our protected network
OpenEFA catches the email side of these attacks. SMS and phone variants bypass email filters entirely — awareness and independent verification are your best defense against those channels.
References
- IRS — Report Phishing and Online Scams
- TIGTA — Treasury Inspector General for Tax Administration
- FTC — Report Fraud
- IC3 — FBI Internet Crime Complaint Center
- Forward phishing emails to phishing@irs.gov
- Forward suspicious texts to 7726 (SPAM)
OpenEFA publishes security advisories when we identify significant phishing campaigns affecting our customers and the broader community. Bookmark this page or follow us for updates.
OpenEFA® is an AI-powered email security platform by Quantum Logic Systems, LLC. Learn more at openefa.com.