Cyber Savvy Broker Newsletter: February 2024
?? Welcome back to the Cyber Savvy Broker Newsletter. Every month, we use this space to explore new and relevant topics for brokers in the cyber insurance world.?
Tax season is upon us in the U.S. and Canada. This is a favorite time of year for just about no one except cybercriminals looking to capitalize on unsuspecting businesses and their employees.?
Bogus 401(k) notices, phony payroll services providers, promises of a “massive” tax return — the list of scams targeting taxpayers and tax professionals grows every year. Recently, the IRS warned tax preparers of “new client” scams ahead of the 2024 filing season.
During tax season, businesses tend to unknowingly lower their defenses to attackers, especially if they outsource accounting, human resources, or other administrative work. In these instances, employees are more likely to receive emails and tax documents from unfamiliar third parties, which can increase their willingness to click on otherwise suspicious links and even transmit sensitive data in unencrypted emails.
Knowing that cyber claims can spike this time of year, we approached Shelley Ma, MS, EnCE , Incident Response Lead at Coalition Incident Response (CIR), an affiliate of Coalition, to learn more about how threat actors dupe businesses and individuals to steal tax information, how they use that data to make money, and how brokers should advise their clients to help them avoid becoming victims.
What is cyber tax fraud?
Cyber tax fraud is a type of cyber event in which a threat actor steals sensitive information for the purpose of committing tax fraud. Typically, cybercriminals use stolen data to file fraudulent tax returns and claim tax refunds.
These events can impact businesses and individuals alike, though the most common targets of these seasonal attacks are certified professional accountant (CPA) firms due to the volume of sensitive financial data they store.
“Cyber tax fraud was most prevalent 8-10 years ago, when tax software was almost exclusively hosted on local premises by firms with poor security and Remote Desktop Protocol (RDP) accessible to the public internet,” noted Ma. “Threat actors would access their servers, steal tax documents, and file returns to collect refunds for themselves.”?
This type of cybercrime has slowed over time but remains prevalent among financial firms, especially this time of year. What’s more, these crimes often go undetected until the proper tax return is filed and the IRS sends a bounce-back noting the taxes were already filed.?
Why CPAs are a prime target for cyber tax fraud
Threat actors target CPA firms for the promise of a larger payday: stealing dozens, even hundreds, of tax returns at once is far more lucrative than targeting one person or business at a time. During the bustle of tax season, these firms are also far less likely to spot anomalies or perform rigorous security audits.
Yet, what enables these events is something we see repeatedly: Almost all cyber tax fraud starts with a phishing email these days.?
Below are four common ways CPA firms are targeted by cyber tax fraud schemes:
1. Email credential harvesting
An accountant at a CPA firm clicks on a phishing email, which leads to credential harvesting (the theft of login information) for their email account. Then, the threat actor uses that email access to reset credentials in the tax portal or software. Even easier, a threat actor might be able to obtain client data directly from the accountant’s inbox. Many documents, like W-2s, contain Social Security numbers and are emailed without encryption during tax season.?
2. Tax software credential harvesting
An accountant clicks on a phishing email that leads to credential harvesting for the tax software itself. First, the phishing email prompts the accountant to sign into a fake tax portal. Then, the threat actor uses the stolen credentials to log into the tax software directly. This scheme is more effective if multi-factor authentication (MFA) isn’t enabled.?
3. Tax portal credential harvesting
A phishing email leads to the harvesting of credentials for the tax portal, which is the backend account management console for CPAs. Then, the threat actor logs into the tax portal with the stolen credentials, creates a fraudulent account, and sets up access using their own email address to mimic the CPA’s domain to access the tax software. This scheme is more sophisticated, which makes the threat actor harder to detect unless the firm performs regular security audits or checks their sign-ins and logs.
4. Social engineering
An accountant clicks on a phishing email from a threat actor posing as IT support to obtain remote access to a workstation belonging to a CPA firm. Once access to a workstation is obtained, the threat actor often moves laterally to servers to access locally stored information.
领英推荐
Case study: Cyber tax fraud goes undetected for months
A small accounting firm discovered signs of a cyber event after the tax filings for nearly two dozen clients were flagged as fraudulent and blocked by the IRS. Months earlier, a threat actor had stolen and submitted the filings, rerouting the tax refunds to another account.
CIR investigated the firm's tax filing software and discovered that illegitimate user accounts had been created within the tax portal and that an unauthorized computer was used to submit the fraudulent tax returns. To avoid detection, the threat actor created a lookalike domain and email address to mimic that of the firm.
“We found evidence of business email compromise but couldn’t definitively link it to tax fraud due to the time that passed between the event and its discovery,” said Ma. “The software provider claimed it sent an email alert about the changes to administrative permissions, but we found no trace of any such communication.”
?Ultimately, the firm’s cyber insurance policy covered the forensic investigation costs, as well as the notification costs and credit monitoring for clients whose data was compromised.
Cyber tax fraud can impact all businesses
CPA firms aren’t the only businesses that need to be on high alert about cyber tax fraud.?
Whether it’s receiving a W-2 from an employer or solicitations from financial institutions, people have grown accustomed to discussing and sharing sensitive information during tax season. That familiarity can cause some to lower their guard to phishing attempts and, ultimately, result in cyber tax fraud.
“We’ve seen threat actors set up fake entities and offer tax services to individuals or businesses,” said Ma. “If they can get you to click, they’ll deploy malware or harvest credentials to get the information they need to file tax returns fraudulently.”?
Threat actors have also been known to target executives in phishing attacks, then use a compromised executive’s email account to gain access to other employees’ tax information.
“A threat actor compromised the email account of the CFO for one of our policyholders, then emailed the HR department and requested employee W-2s,” said Ma. “The fraud went unnoticed, and the threat actor cashed out on the employees’ returns.?
At a time when threat actor activity is spiking — and employees are more willing to share personal data or click on suspicious links — it’s imperative that businesses take proactive steps to reduce the likelihood of a cyber event.
6 ways to reduce the risk of cyber tax fraud
Basic cyber hygiene can go a long way to protect against cyber tax fraud. Whether your client is a CPA firm, healthcare provider, or anything in between, every business can benefit from heightened awareness and reinforced security controls:?
If your client is a CPA firm, they can take additional security measures to protect customer data and reduce the risk of cyber tax fraud:
Learn to spot the warning signs of phishing
Even outside of tax season, phishing is the most common attack vector to execute cyber attacks. As trusted risk advisors, brokers are in a position to help their clients spot the warning signs of a phishing attempt and recommend security controls that can help mitigate the risk of a full-blown incident.
For more information on phishing, check out Coalition’s Incident Preparedness Toolkit and recent phishing case studies.
Thanks for reading the Cyber Savvy Broker Newsletter. Join us for future editions as we continue to explore the most up-to-date and noteworthy topics in the cyber insurance industry. Click the Subscribe button to receive the Cyber Savvy Newsletter directly in your inbox. For more expert insights from the Coalition team, follow us on LinkedIn or bookmark our blog.
This communication is not a proposal of insurance. This communication is designed to provide general information on the topic presented and is not intended to construe or the rendering of legal or other professional services of any kind. If legal or other professional advice is required, the services of a professional should be sought. The views and opinions expressed as part of this communication do not necessarily state or reflect those of Coalition. Neither Coalition nor any of its employees make any warranty of any kind, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or process disclosed. Any action you take upon the information contained herein is strictly at your own risk. Coalition will not be liable for any losses and damages in connection with your use or reliance upon the information. Copyright ? 2024. All rights reserved. Coalition and the Coalition logo are trademarks of Coalition, Inc.