{"id":7332,"date":"2017-04-13T05:00:09","date_gmt":"2017-04-13T13:00:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/13\/news-1123\/"},"modified":"2017-04-13T05:00:09","modified_gmt":"2017-04-13T13:00:09","slug":"news-1123","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/13\/news-1123\/","title":{"rendered":"Why Scammers Want Your Tax Returns (and how to stop them)"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Thu, 13 Apr 2017 12:00:02 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"299\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/11\/Hackers-very-often-have-to-handle-a-lot-of-money-and-keep-it-away-from-the-authorities-_459_40144319_0_7076125_300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Hackers very often have to handle a lot of money, and keep it away from the authorities.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/11\/Hackers-very-often-have-to-handle-a-lot-of-money-and-keep-it-away-from-the-authorities-_459_40144319_0_7076125_300.jpg 299w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/11\/Hackers-very-often-have-to-handle-a-lot-of-money-and-keep-it-away-from-the-authorities-_459_40144319_0_7076125_300-125x85.jpg 125w\" sizes=\"auto, (max-width: 299px) 100vw, 299px\" \/><\/p>\n<p>It\u2019s almost here \u2013 April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting more intelligent every year.<strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>How it works<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/business-email-compromise-bec-schemes\">Business Email Compromise (BEC)<\/a> scams have been on the rise since 2016, and tax season is another large uptick in numbers so much so that it caused the IRS to issue a warning to organizations on the high risk of these attacks.<\/p>\n<p>BEC scams are simple in execution and are all focused on one thing \u2013 to compromise business email accounts in order to facilitate phishing scams to achieve unauthorized fund transfers to fraudulent accounts around the world. However, cybercriminals operating this particular type of scheme must perform a significant amount of research prior to attempting an attack on a target. It takes a firm understanding of the target company, how they operate, and even the interpersonal relationships of employees to effectively reach the desired outcome.<\/p>\n<p>For BEC scams targeting tax refunds, scammers pose as the CEO and request employee payroll and W2 information from someone in finance or HR. If successful, this information is then used by the attackers to steal tax refunds from their intended recipients. Trend Micro recently published a <a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-cybercrime-in-west-africa.pdf\">report<\/a> on West African cybercriminals who utilize this threat extensively.<br \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-538950 \" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-4.jpg\" alt=\"\" width=\"618\" height=\"189\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-4.jpg 743w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-4-300x92.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-4-640x196.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-4-440x134.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/blog-4-380x116.jpg 380w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>What to do about it<\/strong><\/p>\n<p>To counter the threat, all individuals in a company with access to employee data should be notified of BEC threats, and reminded of the increased risk of attack during tax season. Also, employees need to be reminded that the types of information requested by cybercriminals should never be sent over email unless it\u2019s encrypted.<\/p>\n<p>To help inform yourself and your employees on the dangers of spoofing, the Department of Justice, the IRS and the Federal Bureau of Investigation (FBI) have provided example content of emails confirmed to have been fraudulent. Here are some things to watch for:<\/p>\n<p>\u2022 Requests that discourage contacting the executive for confirmation.<\/p>\n<p>\u2022\u00a0Emails containing the following language:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>&#8220;Kindly send me the individual 2016 W-2 (PDF) and earnings summary of all W\u20112 of our company staff for a quick review.&#8221;<\/li>\n<li>&#8220;Can you send me the updated list of employees with full details such as name, social security number, date of birth, home address and salary.&#8221;<\/li>\n<li>&#8220;I want you to send me the list of W-2 copy of employees wage and tax statement for 2016, I need them in PDF file type, you can send it as an attachment. Kindly prepare the lists and email them to me asap.&#8221;<\/li>\n<li>Email communications allegedly from the IRS or other tax companies. The IRS has explained that it does not send unsolicited email, text messages or use social media to discuss personal tax issues. Therefore, if an employee of your organization receives an email or telephone call from someone claiming to be an IRS employee and demanding money, it may be helpful to consult the IRS Tax Scams\/Consumer Alerts webpage:\u00a0<a href=\"http:\/\/www.irs.gov\/uac\/Tax-Scams-Consumer-Alerts\">http:\/\/www.irs.gov\/uac\/Tax-Scams-Consumer-Alerts<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Businesses should look into email security solutions that have the ability to identify and block socially engineered emails that in particular do not have an attachment nor an embedded link. The tax scam emails typically only contain content asking the employee to send the employee PII data.<\/p>\n<p>Other options for protecting against BEC scams are:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><a href=\"http:\/\/www.trendmicro.com\/us\/enterprise\/network-security\/interscan-message-security\/#targeted-attacks\">Trend Micro Interscan\u2122 Messaging Security Virtual Appliance<\/a> or <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/hosted-email-security.html\">Hosted Email Security<\/a> &#8211; It detects and flags spear phishing and socially-engineered emails by correlating email components with new, advanced social engineering attack protection technologies in order to block them before even reaching employee mailboxes.<\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint\/integrated-data-loss-prevention.html\">Trend Micro Integrated Data Loss Prevention<\/a> (iDLP) \u2013 DLP is supported with Trend Micro email solutions and can be a good option to detect and block the exfiltration of PII data being transferred via email.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Knowing that these threats use email as an attack vector, companies should strengthen employee education and invest smartly in advanced email protection. With these, the threat of BEC attacks can be greatly reduced.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/scammers-want-tax-returns-stop\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Thu, 13 Apr 2017 12:00:02 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"299\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/11\/Hackers-very-often-have-to-handle-a-lot-of-money-and-keep-it-away-from-the-authorities-_459_40144319_0_7076125_300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Hackers very often have to handle a lot of money, and keep it away from the authorities.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/11\/Hackers-very-often-have-to-handle-a-lot-of-money-and-keep-it-away-from-the-authorities-_459_40144319_0_7076125_300.jpg 299w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/11\/Hackers-very-often-have-to-handle-a-lot-of-money-and-keep-it-away-from-the-authorities-_459_40144319_0_7076125_300-125x85.jpg 125w\" sizes=\"auto, (max-width: 299px) 100vw, 299px\" \/>It\u2019s almost here \u2013 April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting more intelligent every year.\u00a0 &#160; How it works Business Email Compromise (BEC) scams have been on the rise since 2016, and&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[4503,11063,714],"class_list":["post-7332","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cybercrime","tag-data-privacy","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7332"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7332\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7332"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}