Skip to content

Recent Posts

  • Taxgirl Goes To The Movies: Star Wars
  • Looking For Tax Breaks?
  • Taxgirl Goes Back To The Movies In 2025
  • Here’s What You Need To Know About Submitting Tax Questions
  • Looking For More Great Tax Content?

Most Used Categories

  • individual (1,314)
  • politics (862)
  • IRS news/announcements (753)
  • tax policy (582)
  • ask the taxgirl (543)
  • prosecutions, felonies and misdemeanors (479)
  • just for fun (478)
  • state & local (403)
  • pop culture (399)
  • charitable organizations (389)
Skip to content

Taxgirl

Because paying taxes is painful… but reading about them shouldn’t be.

  • About Taxgirl
  • Info
    • My Disclaimer
    • A Word (or More) About Your Privacy
    • Subscribe
  • Ask The Taxgirl
  • Comments
  • Taxgirl Podcast
    • Podcast Season 1
    • Podcast Season 2
    • Podcast Season 3
  • Contact
  • Home
  • 2017
  • August
  • 23
  • IRS Warns Again On Email Scam After FBI Reports Billions In Related Losses

IRS Warns Again On Email Scam After FBI Reports Billions In Related Losses

Kelly Phillips ErbAugust 23, 2017

The Internal Revenue Service (IRS), state tax agencies, and the tax industry have announced a recent increase in email scams targeting employee forms W-2. Forms W-2 contain potentially sensitive information including an employee’s name, address, Social Security number, income, and withholdings.
The IRS reported a sharp increase in the number of scam incidents and victims during the 2017 filing season: the number of businesses, public schools, universities, tribal governments and nonprofits victimized by the W-2 scam increased to 200 (from 50 in 2016), translating into several hundred thousand employees whose sensitive data was stolen. In February, the IRS issued an urgent alert that the scam was targeting school districts, tribal organizations, and nonprofits; previously, the scammers had focused on for-profit corporations.
Earlier this year, the Federal Bureau of Investigation (FBI) reported a 1,300% increase in identified losses – with more than $3 billion in wire transfers – since January 2015 through the same kind of scam known as business e-mail compromise (BEC) or CEO impersonation.
Here’s how the W-2 scam typically works. Fraudsters send a fake email pretending to be from a high-level corporate employee, like a CEO, requesting a information about employee forms W-2 from a company’s payroll or human resources departments. The emails typically ask for the forms W-2 and earnings summary of all W-2 employees or an updated list of employees with their details including Social Security Number, home address, and salary. Just like that, the scammers can capture all of the data for an entire company.
Instead of – or in addition to – tax data, thieves posing as the CEO may request that the employee make an immediate wire transfer from the company, usually to a trusted vendor. Of course, those tax forms and possibly hundreds of thousands of dollars end up in the hands of thieves.
To be convincing, the thieves, posing as the CEO, may access the company’s network through a spear-phishing attack and the use of malware in advance of the scam. They familiarize themselves with the company’s vendors and billing systems, as well as the CEO’s style of e-mail communication and possibly, the CEO’s travel schedule. Access to this kind of information makes it easier to trick employees into complying with requests.
So why would the thieves familiarize themselves with the CEO’s travel schedule? To limit the possibility that employees would ask questions directly. Don’t fall for it, advises the FBI. According to Martin Licciardo, special agent, FBI Washington Field Office, “The best way to avoid being exploited is to verify the authenticity of requests to send money by walking into the CEO’s office or speaking to him or her directly on the phone. Don’t rely on e-mail alone.”
“These are incredibly tricky schemes that can be devastating to a tax professional or business,” said IRS Commissioner John Koskinen. “Cybercriminals target people with access to sensitive information, and they cleverly disguise their effort through an official-looking email request.”
That information – typically those forms W-2 – may be used to file fraudulent tax returns. Additionally, your personal information is marketable, and it can be posted for sale on the Dark Net (read more on the identity theft industry here).
Businesses and organizations which have been affected by the scheme should report the theft of the W-2 data to the IRS to dataloss@irs.gov. Be sure to include “W-2 scam” in the subject line and information about a point of contact in the body of the email. You should also report the theft to the FBI at the Internet Crime Complaint Center (IC3).
Businesses and organizations which have received a suspicious email but did not respond with information should forward the email to phishing@irs.gov with “W-2 scam” in the subject line.
If you are an employee whose form W-2 has been stolen, you should review the recommended actions by the Federal Trade Commission at www.identitytheft.gov or the IRS at www.irs.gov/identitytheft. If your form W-2 was stolen and your tax return is kicked back during tax season, you should file a form 14039, Identity Theft Affidavit (downloads as a pdf).
The IRS urges employers, including tax practitioners, to review their policies for sending sensitive data such as forms W-2 or making wire transfers based on an email request. Consider requiring employees to confirm requests for forms W-2, wire transfers or any sensitive data exchanges verbally, using previously-known telephone numbers, not telephone numbers listed in the email. Requests for location changes in vendor payments should require a secondary sign-off by company personnel. Additionally, consult with an IT professional to ensure that your systems are secure.
The FBI recommends that companies create “intrusion detection system rules” that flag e-mails with extensions that are similar to company email meant to trick employees. For example, legitimate e-mail of abc_company.com would flag fraudulent email of abc-company.com. The FBI also suggests that you create an email rule to flag email communications where the “reply” email address is different from the “from” email address shown. Finally, consider color coding virtual correspondence so emails from employee/internal accounts are one color and emails from non-employee/external accounts are another.
Don’t fall for the tricks. Keep your personal information safe by remaining alert. For tips on protecting yourself from identity theft-related tax fraud, click here.

Facebooktwitterlinkedinmail
author avatar
Kelly Phillips Erb
Kelly Phillips Erb is a tax attorney, tax writer, and podcaster.
See Full Bio
social network icon social network icon

Post navigation

Previous: Don't Forget About Taxes When Looking For The Perfect Rental
Next: Ask The Taxgirl: Deducting Fidget Spinners On Your Taxes

Related Posts

IRS Releases ETAAC Recommendations to Congress 

July 5, 2024July 5, 2024 Kelly Phillips Erb
Open Sign

Tax Season Opens on January 23—And Taxpayers Have More Time to File

January 12, 2023January 12, 2023 Kelly Phillips Erb
rain

IRS Offers California Storm Victims Extra Time to File

January 11, 2023January 11, 2023 Kelly Phillips Erb

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

© 2005-2022, Kelly Phillips Erb | Theme: BlockWP by Candid Themes.
Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • SitemapSitemap
  • FeedbackFeedback